Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2023-45857
Vulnerability from cvelistv5
Published
2023-11-08 00:00
Modified
2024-09-04 15:15
Severity ?
EPSS score ?
Summary
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:29:32.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/axios/axios/issues/6006" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45857", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T15:13:57.418014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T15:15:16.506Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-21T19:06:56.497896", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/axios/axios/issues/6006" }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45857", "datePublished": "2023-11-08T00:00:00", "dateReserved": "2023-10-14T00:00:00", "dateUpdated": "2024-09-04T15:15:16.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-45857\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-11-08T21:15:08.550\",\"lastModified\":\"2024-11-21T08:27:30.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.\"},{\"lang\":\"es\",\"value\":\"Un problema descubierto en Axios 1.5.1 revela inadvertidamente el XSRF-TOKEN confidencial almacenado en las cookies al incluirlo en el encabezado HTTP X-XSRF-TOKEN para cada solicitud realizada a cualquier host, lo que permite a los atacantes ver informaci\u00f3n sensible.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:axios:axios:1.5.1:*:*:*:*:node.js:*:*\",\"matchCriteriaId\":\"28179B3F-4DC0-416C-BC68-2678D3DF2313\"}]}]}],\"references\":[{\"url\":\"https://github.com/axios/axios/issues/6006\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/axios/axios/issues/6006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2024_1640
Vulnerability from csaf_redhat
Published
2024-04-02 19:34
Modified
2024-12-17 22:37
Summary
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
Notes
Topic
An update is now available for Red Hat Ansible Automation Platform 2.4
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.
Security Fix(es):
* automation-controller: Django: denial-of-service in 'intcomma' template filter (CVE-2024-24680)
* automation-controller: aiohttp: http request smuggling (CVE-2024-23829)
* automation-controller: aiohttp: follow_symlinks directory traversal vulnerability (CVE-2024-23334)
* automation-controller: Jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)
* automation-controller: cryptography: NULL-dereference when loading PKCS7 certificates (CVE-2023-49083)
* automation-controller: aiohttp: numerous issues in HTTP parser with header parsing (CVE-2023-47627)
* automation-controller: Twisted: disordered HTTP pipeline response in twisted.web (CVE-2023-46137)
* automation-controller: axios: exposure of confidential data stored in cookies (CVE-2023-45857)
* automation-controller: GitPython: Blind local file inclusion (CVE-2023-41040)
* python3-aiohttp/python39-aiohttp: http request smuggling (CVE-2024-23829)
* python3-aiohttp/python39-aiohttp: follow_symlinks directory traversal vulnerability (CVE-2024-23334)
* python3-django/python39-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words() (CVE-2024-27351)
* receptor: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
* receptor: golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updates and fixes for automation controller:
* Fixed bug where schedule prompted variables and survey answers were reset on edit when changing one of the basic form fields (AAP-20967)
* Fixed the update execution environment image to no longer fail jobs that use the previous image (AAP-21733)
* Removed string validation using comparisons of English literals for comparison, replacing validation with error/op codes as a universal approach to validation and comparison (AAP-21721)
* Fixed dispatcher to appropriately terminate child processes when dispatcher terminates (AAP-21049)
* Fixed upgrade from Ansible Tower 3.8.6 to AAP 2.4 to no longer fail upon database schema migration (AAP-19738)
* automation-controller has been updated to 4.5.5
Updates and fixes for receptor:
* Fixes a receptor dialing issue where the connection attempt is timed out too aggressively (AAP-21838, AAP-21828)
* receptor has been updated to 1.4.5
Additional fixes:
* ansible-core has been updated to 2.15.10
* ansible-runner has been updated to 2.3.6
* python3-aiohttp/python39-aiohttp has been updated to 3.9.3
* python3-django/python39-django has been updated 4.2.11
* python3-pulpcore/python39-pulpcore has been updated 3.28.24
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Ansible Automation Platform 2.4\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* automation-controller: Django: denial-of-service in \u0027intcomma\u0027 template filter (CVE-2024-24680)\n* automation-controller: aiohttp: http request smuggling (CVE-2024-23829)\n* automation-controller: aiohttp: follow_symlinks directory traversal vulnerability (CVE-2024-23334)\n* automation-controller: Jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)\n* automation-controller: cryptography: NULL-dereference when loading PKCS7 certificates (CVE-2023-49083)\n* automation-controller: aiohttp: numerous issues in HTTP parser with header parsing (CVE-2023-47627)\n* automation-controller: Twisted: disordered HTTP pipeline response in twisted.web (CVE-2023-46137)\n* automation-controller: axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n* automation-controller: GitPython: Blind local file inclusion (CVE-2023-41040)\n* python3-aiohttp/python39-aiohttp: http request smuggling (CVE-2024-23829)\n* python3-aiohttp/python39-aiohttp: follow_symlinks directory traversal vulnerability (CVE-2024-23334)\n* python3-django/python39-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words() (CVE-2024-27351)\n* receptor: golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)\n* receptor: golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nUpdates and fixes for automation controller:\n* Fixed bug where schedule prompted variables and survey answers were reset on edit when changing one of the basic form fields (AAP-20967)\n* Fixed the update execution environment image to no longer fail jobs that use the previous image (AAP-21733)\n* Removed string validation using comparisons of English literals for comparison, replacing validation with error/op codes as a universal approach to validation and comparison (AAP-21721)\n* Fixed dispatcher to appropriately terminate child processes when dispatcher terminates (AAP-21049)\n* Fixed upgrade from Ansible Tower 3.8.6 to AAP 2.4 to no longer fail upon database schema migration (AAP-19738)\n* automation-controller has been updated to 4.5.5\n\nUpdates and fixes for receptor:\n* Fixes a receptor dialing issue where the connection attempt is timed out too aggressively (AAP-21838, AAP-21828)\n* receptor has been updated to 1.4.5\n\nAdditional fixes:\n* ansible-core has been updated to 2.15.10\n* ansible-runner has been updated to 2.3.6\n* python3-aiohttp/python39-aiohttp has been updated to 3.9.3\n* python3-django/python39-django has been updated 4.2.11\n* python3-pulpcore/python39-pulpcore has been updated 3.28.24", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1640", "url": "https://access.redhat.com/errata/RHSA-2024:1640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2246264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246264" }, { "category": "external", "summary": "2247040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247040" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "2249825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249825" }, { "category": "external", "summary": "2253330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330" }, { "category": "external", "summary": "2255331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255331" }, { "category": "external", "summary": "2257854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257854" }, { "category": "external", "summary": "2261856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261856" }, { "category": "external", "summary": "2261887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261887" }, { "category": "external", "summary": "2261909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261909" }, { "category": "external", "summary": "2262921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262921" }, { "category": "external", "summary": "2266045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266045" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1640.json" } ], "title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update", "tracking": { "current_release_date": "2024-12-17T22:37:39+00:00", "generator": { "date": "2024-12-17T22:37:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:1640", "initial_release_date": "2024-04-02T19:34:39+00:00", "revision_history": [ { "date": "2024-04-02T19:34:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-02T19:34:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:37:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat Ansible Automation Platform" }, { "branches": [ { "category": "product_version", "name": "python-pulpcore-0:3.28.24-1.el9ap.src", "product": { "name": "python-pulpcore-0:3.28.24-1.el9ap.src", "product_id": "python-pulpcore-0:3.28.24-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pulpcore@3.28.24-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "python-aiohttp-0:3.9.3-1.el9ap.src", "product": { "name": "python-aiohttp-0:3.9.3-1.el9ap.src", "product_id": "python-aiohttp-0:3.9.3-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aiohttp@3.9.3-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "python-django-0:4.2.11-1.el9ap.src", "product": { "name": "python-django-0:4.2.11-1.el9ap.src", "product_id": "python-django-0:4.2.11-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-django@4.2.11-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "ansible-runner-0:2.3.6-1.el9ap.src", "product": { "name": "ansible-runner-0:2.3.6-1.el9ap.src", "product_id": "ansible-runner-0:2.3.6-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@2.3.6-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el9ap.src", "product": { "name": "receptor-0:1.4.5-1.el9ap.src", "product_id": "receptor-0:1.4.5-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "ansible-core-1:2.15.10-1.el9ap.src", "product": { "name": "ansible-core-1:2.15.10-1.el9ap.src", "product_id": "ansible-core-1:2.15.10-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.15.10-1.el9ap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el9ap.src", "product": { "name": "automation-controller-0:4.5.5-2.el9ap.src", "product_id": "automation-controller-0:4.5.5-2.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el9ap?arch=src" } } }, { "category": "product_version", "name": "python3x-django-0:4.2.11-1.el8ap.src", "product": { "name": "python3x-django-0:4.2.11-1.el8ap.src", "product_id": "python3x-django-0:4.2.11-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3x-django@4.2.11-1.el8ap?arch=src" } } }, { "category": "product_version", "name": "python3x-pulpcore-0:3.28.24-1.el8ap.src", "product": { "name": "python3x-pulpcore-0:3.28.24-1.el8ap.src", "product_id": "python3x-pulpcore-0:3.28.24-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3x-pulpcore@3.28.24-1.el8ap?arch=src" } } }, { "category": "product_version", "name": "python3x-aiohttp-0:3.9.3-1.el8ap.src", "product": { "name": "python3x-aiohttp-0:3.9.3-1.el8ap.src", "product_id": "python3x-aiohttp-0:3.9.3-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3x-aiohttp@3.9.3-1.el8ap?arch=src" } } }, { "category": "product_version", "name": "ansible-runner-0:2.3.6-1.el8ap.src", "product": { "name": "ansible-runner-0:2.3.6-1.el8ap.src", "product_id": "ansible-runner-0:2.3.6-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@2.3.6-1.el8ap?arch=src" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el8ap.src", "product": { "name": "receptor-0:1.4.5-1.el8ap.src", "product_id": "receptor-0:1.4.5-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el8ap?arch=src" } } }, { "category": "product_version", "name": "ansible-core-1:2.15.10-1.el8ap.src", "product": { "name": "ansible-core-1:2.15.10-1.el8ap.src", "product_id": "ansible-core-1:2.15.10-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.15.10-1.el8ap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el8ap.src", "product": { "name": "automation-controller-0:4.5.5-2.el8ap.src", "product_id": "automation-controller-0:4.5.5-2.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el8ap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python3-pulpcore-0:3.28.24-1.el9ap.noarch", "product": { "name": "python3-pulpcore-0:3.28.24-1.el9ap.noarch", "product_id": "python3-pulpcore-0:3.28.24-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pulpcore@3.28.24-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "python3-django-0:4.2.11-1.el9ap.noarch", "product": { "name": "python3-django-0:4.2.11-1.el9ap.noarch", "product_id": "python3-django-0:4.2.11-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-django@4.2.11-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "ansible-runner-0:2.3.6-1.el9ap.noarch", "product": { "name": "ansible-runner-0:2.3.6-1.el9ap.noarch", "product_id": "ansible-runner-0:2.3.6-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@2.3.6-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "product": { "name": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "product_id": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ansible-runner@2.3.6-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "receptorctl-0:1.4.5-1.el9ap.noarch", "product": { "name": "receptorctl-0:1.4.5-1.el9ap.noarch", "product_id": "receptorctl-0:1.4.5-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptorctl@1.4.5-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "ansible-core-1:2.15.10-1.el9ap.noarch", "product": { "name": "ansible-core-1:2.15.10-1.el9ap.noarch", "product_id": "ansible-core-1:2.15.10-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.15.10-1.el9ap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-test-1:2.15.10-1.el9ap.noarch", "product": { "name": "ansible-test-1:2.15.10-1.el9ap.noarch", "product_id": "ansible-test-1:2.15.10-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.15.10-1.el9ap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "automation-controller-cli-0:4.5.5-2.el9ap.noarch", "product": { "name": "automation-controller-cli-0:4.5.5-2.el9ap.noarch", "product_id": "automation-controller-cli-0:4.5.5-2.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-cli@4.5.5-2.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-server-0:4.5.5-2.el9ap.noarch", "product": { "name": "automation-controller-server-0:4.5.5-2.el9ap.noarch", "product_id": "automation-controller-server-0:4.5.5-2.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-server@4.5.5-2.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-ui-0:4.5.5-2.el9ap.noarch", "product": { "name": "automation-controller-ui-0:4.5.5-2.el9ap.noarch", "product_id": "automation-controller-ui-0:4.5.5-2.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-ui@4.5.5-2.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "python39-django-0:4.2.11-1.el8ap.noarch", "product": { "name": "python39-django-0:4.2.11-1.el8ap.noarch", "product_id": "python39-django-0:4.2.11-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-django@4.2.11-1.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "python39-pulpcore-0:3.28.24-1.el8ap.noarch", "product": { "name": "python39-pulpcore-0:3.28.24-1.el8ap.noarch", "product_id": "python39-pulpcore-0:3.28.24-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-pulpcore@3.28.24-1.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "ansible-runner-0:2.3.6-1.el8ap.noarch", "product": { "name": "ansible-runner-0:2.3.6-1.el8ap.noarch", "product_id": "ansible-runner-0:2.3.6-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@2.3.6-1.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "product": { "name": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "product_id": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-ansible-runner@2.3.6-1.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "receptorctl-0:1.4.5-1.el8ap.noarch", "product": { "name": "receptorctl-0:1.4.5-1.el8ap.noarch", "product_id": "receptorctl-0:1.4.5-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptorctl@1.4.5-1.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "ansible-core-1:2.15.10-1.el8ap.noarch", "product": { "name": "ansible-core-1:2.15.10-1.el8ap.noarch", "product_id": "ansible-core-1:2.15.10-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-core@2.15.10-1.el8ap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-test-1:2.15.10-1.el8ap.noarch", "product": { "name": "ansible-test-1:2.15.10-1.el8ap.noarch", "product_id": "ansible-test-1:2.15.10-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-test@2.15.10-1.el8ap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "automation-controller-cli-0:4.5.5-2.el8ap.noarch", "product": { "name": "automation-controller-cli-0:4.5.5-2.el8ap.noarch", "product_id": "automation-controller-cli-0:4.5.5-2.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-cli@4.5.5-2.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-server-0:4.5.5-2.el8ap.noarch", "product": { "name": "automation-controller-server-0:4.5.5-2.el8ap.noarch", "product_id": "automation-controller-server-0:4.5.5-2.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-server@4.5.5-2.el8ap?arch=noarch" } } }, { "category": "product_version", "name": "automation-controller-ui-0:4.5.5-2.el8ap.noarch", "product": { "name": "automation-controller-ui-0:4.5.5-2.el8ap.noarch", "product_id": "automation-controller-ui-0:4.5.5-2.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-ui@4.5.5-2.el8ap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "product": { "name": "python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "product_id": "python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-aiohttp@3.9.3-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "product": { "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "product_id": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aiohttp-debugsource@3.9.3-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "product": { "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "product_id": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-aiohttp-debuginfo@3.9.3-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el9ap.x86_64", "product": { "name": "receptor-0:1.4.5-1.el9ap.x86_64", "product_id": "receptor-0:1.4.5-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el9ap.x86_64", "product": { "name": "automation-controller-0:4.5.5-2.el9ap.x86_64", "product_id": "automation-controller-0:4.5.5-2.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "product": { "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "product_id": "automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.5-2.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "product": { "name": "python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "product_id": "python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-aiohttp@3.9.3-1.el8ap?arch=x86_64" } } }, { "category": "product_version", "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "product": { "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "product_id": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3x-aiohttp-debugsource@3.9.3-1.el8ap?arch=x86_64" } } }, { "category": "product_version", "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "product": { "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "product_id": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-aiohttp-debuginfo@3.9.3-1.el8ap?arch=x86_64" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el8ap.x86_64", "product": { "name": "receptor-0:1.4.5-1.el8ap.x86_64", "product_id": "receptor-0:1.4.5-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el8ap?arch=x86_64" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el8ap.x86_64", "product": { "name": "automation-controller-0:4.5.5-2.el8ap.x86_64", "product_id": "automation-controller-0:4.5.5-2.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el8ap?arch=x86_64" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "product": { "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "product_id": "automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.5-2.el8ap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "product": { "name": "python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "product_id": "python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-aiohttp@3.9.3-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "product": { "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "product_id": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aiohttp-debugsource@3.9.3-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "product": { "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "product_id": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-aiohttp-debuginfo@3.9.3-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el9ap.ppc64le", "product": { "name": "receptor-0:1.4.5-1.el9ap.ppc64le", "product_id": "receptor-0:1.4.5-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el9ap.ppc64le", "product": { "name": "automation-controller-0:4.5.5-2.el9ap.ppc64le", "product_id": "automation-controller-0:4.5.5-2.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "product": { "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "product_id": "automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.5-2.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "product": { "name": "python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "product_id": "python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-aiohttp@3.9.3-1.el8ap?arch=ppc64le" } } }, { "category": "product_version", "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "product": { "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "product_id": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3x-aiohttp-debugsource@3.9.3-1.el8ap?arch=ppc64le" } } }, { "category": "product_version", "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "product": { "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "product_id": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-aiohttp-debuginfo@3.9.3-1.el8ap?arch=ppc64le" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el8ap.ppc64le", "product": { "name": "receptor-0:1.4.5-1.el8ap.ppc64le", "product_id": "receptor-0:1.4.5-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el8ap?arch=ppc64le" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el8ap.ppc64le", "product": { "name": "automation-controller-0:4.5.5-2.el8ap.ppc64le", "product_id": "automation-controller-0:4.5.5-2.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el8ap?arch=ppc64le" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "product": { "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "product_id": "automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.5-2.el8ap?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python3-aiohttp-0:3.9.3-1.el9ap.s390x", "product": { "name": "python3-aiohttp-0:3.9.3-1.el9ap.s390x", "product_id": "python3-aiohttp-0:3.9.3-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-aiohttp@3.9.3-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "product": { "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "product_id": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aiohttp-debugsource@3.9.3-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "product": { "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "product_id": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-aiohttp-debuginfo@3.9.3-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el9ap.s390x", "product": { "name": "receptor-0:1.4.5-1.el9ap.s390x", "product_id": "receptor-0:1.4.5-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el9ap.s390x", "product": { "name": "automation-controller-0:4.5.5-2.el9ap.s390x", "product_id": "automation-controller-0:4.5.5-2.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "product": { "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "product_id": "automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.5-2.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "python39-aiohttp-0:3.9.3-1.el8ap.s390x", "product": { "name": "python39-aiohttp-0:3.9.3-1.el8ap.s390x", "product_id": "python39-aiohttp-0:3.9.3-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-aiohttp@3.9.3-1.el8ap?arch=s390x" } } }, { "category": "product_version", "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "product": { "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "product_id": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3x-aiohttp-debugsource@3.9.3-1.el8ap?arch=s390x" } } }, { "category": "product_version", "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "product": { "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "product_id": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-aiohttp-debuginfo@3.9.3-1.el8ap?arch=s390x" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el8ap.s390x", "product": { "name": "receptor-0:1.4.5-1.el8ap.s390x", "product_id": "receptor-0:1.4.5-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el8ap?arch=s390x" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el8ap.s390x", "product": { "name": "automation-controller-0:4.5.5-2.el8ap.s390x", "product_id": "automation-controller-0:4.5.5-2.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el8ap?arch=s390x" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "product": { "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "product_id": "automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.5-2.el8ap?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "product": { "name": "python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "product_id": "python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-aiohttp@3.9.3-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "product": { "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "product_id": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-aiohttp-debugsource@3.9.3-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "product": { "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "product_id": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-aiohttp-debuginfo@3.9.3-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el9ap.aarch64", "product": { "name": "receptor-0:1.4.5-1.el9ap.aarch64", "product_id": "receptor-0:1.4.5-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el9ap.aarch64", "product": { "name": "automation-controller-0:4.5.5-2.el9ap.aarch64", "product_id": "automation-controller-0:4.5.5-2.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "product": { "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "product_id": "automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.5-2.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "product": { "name": "python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "product_id": "python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-aiohttp@3.9.3-1.el8ap?arch=aarch64" } } }, { "category": "product_version", "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "product": { "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "product_id": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3x-aiohttp-debugsource@3.9.3-1.el8ap?arch=aarch64" } } }, { "category": "product_version", "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "product": { "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "product_id": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python39-aiohttp-debuginfo@3.9.3-1.el8ap?arch=aarch64" } } }, { "category": "product_version", "name": "receptor-0:1.4.5-1.el8ap.aarch64", "product": { "name": "receptor-0:1.4.5-1.el8ap.aarch64", "product_id": "receptor-0:1.4.5-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.5-1.el8ap?arch=aarch64" } } }, { "category": "product_version", "name": "automation-controller-0:4.5.5-2.el8ap.aarch64", "product": { "name": "automation-controller-0:4.5.5-2.el8ap.aarch64", "product_id": "automation-controller-0:4.5.5-2.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller@4.5.5-2.el8ap?arch=aarch64" } } }, { "category": "product_version", "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "product": { "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "product_id": "automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-controller-venv-tower@4.5.5-2.el8ap?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch" }, "product_reference": "ansible-core-1:2.15.10-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src" }, "product_reference": "ansible-core-1:2.15.10-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch" }, "product_reference": "ansible-runner-0:2.3.6-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src" }, "product_reference": "ansible-runner-0:2.3.6-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.10-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch" }, "product_reference": "ansible-test-1:2.15.10-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch" }, "product_reference": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.5-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.5-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.5-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src" }, "product_reference": "receptor-0:1.4.5-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.5-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.5-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.5-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch" }, "product_reference": "ansible-core-1:2.15.10-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src" }, "product_reference": "ansible-core-1:2.15.10-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch" }, "product_reference": "ansible-runner-0:2.3.6-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src" }, "product_reference": "ansible-runner-0:2.3.6-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.10-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch" }, "product_reference": "ansible-test-1:2.15.10-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch" }, "product_reference": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.5-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.5-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.5-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src" }, "product_reference": "receptor-0:1.4.5-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.5-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.5-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.5-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch" }, "product_reference": "ansible-core-1:2.15.10-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src" }, "product_reference": "ansible-core-1:2.15.10-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch" }, "product_reference": "ansible-runner-0:2.3.6-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src" }, "product_reference": "ansible-runner-0:2.3.6-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.10-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch" }, "product_reference": "ansible-test-1:2.15.10-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64" }, "product_reference": "automation-controller-0:4.5.5-2.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le" }, "product_reference": "automation-controller-0:4.5.5-2.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x" }, "product_reference": "automation-controller-0:4.5.5-2.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src" }, "product_reference": "automation-controller-0:4.5.5-2.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64" }, "product_reference": "automation-controller-0:4.5.5-2.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-cli-0:4.5.5-2.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch" }, "product_reference": "automation-controller-cli-0:4.5.5-2.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-server-0:4.5.5-2.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch" }, "product_reference": "automation-controller-server-0:4.5.5-2.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-ui-0:4.5.5-2.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch" }, "product_reference": "automation-controller-ui-0:4.5.5-2.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64" }, "product_reference": "automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le" }, "product_reference": "automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x" }, "product_reference": "automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64" }, "product_reference": "automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-aiohttp-0:3.9.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64" }, "product_reference": "python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-aiohttp-0:3.9.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le" }, "product_reference": "python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-aiohttp-0:3.9.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x" }, "product_reference": "python39-aiohttp-0:3.9.3-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-aiohttp-0:3.9.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64" }, "product_reference": "python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64" }, "product_reference": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le" }, "product_reference": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x" }, "product_reference": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64" }, "product_reference": "python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch" }, "product_reference": "python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-django-0:4.2.11-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch" }, "product_reference": "python39-django-0:4.2.11-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python39-pulpcore-0:3.28.24-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch" }, "product_reference": "python39-pulpcore-0:3.28.24-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3x-aiohttp-0:3.9.3-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src" }, "product_reference": "python3x-aiohttp-0:3.9.3-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64" }, "product_reference": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le" }, "product_reference": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x" }, "product_reference": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64" }, "product_reference": "python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3x-django-0:4.2.11-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src" }, "product_reference": "python3x-django-0:4.2.11-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3x-pulpcore-0:3.28.24-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src" }, "product_reference": "python3x-pulpcore-0:3.28.24-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.5-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.5-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.5-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src" }, "product_reference": "receptor-0:1.4.5-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.5-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.5-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.5-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch" }, "product_reference": "ansible-core-1:2.15.10-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src" }, "product_reference": "ansible-core-1:2.15.10-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch" }, "product_reference": "ansible-runner-0:2.3.6-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src" }, "product_reference": "ansible-runner-0:2.3.6-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.10-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch" }, "product_reference": "ansible-test-1:2.15.10-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch" }, "product_reference": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.5-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.5-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.5-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src" }, "product_reference": "receptor-0:1.4.5-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.5-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.5-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.5-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch" }, "product_reference": "ansible-core-1:2.15.10-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src" }, "product_reference": "ansible-core-1:2.15.10-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch" }, "product_reference": "ansible-runner-0:2.3.6-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src" }, "product_reference": "ansible-runner-0:2.3.6-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.10-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch" }, "product_reference": "ansible-test-1:2.15.10-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch" }, "product_reference": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.5-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.5-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.5-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src" }, "product_reference": "receptor-0:1.4.5-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.5-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.5-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.5-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch" }, "product_reference": "ansible-core-1:2.15.10-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-core-1:2.15.10-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src" }, "product_reference": "ansible-core-1:2.15.10-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch" }, "product_reference": "ansible-runner-0:2.3.6-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:2.3.6-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src" }, "product_reference": "ansible-runner-0:2.3.6-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-test-1:2.15.10-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch" }, "product_reference": "ansible-test-1:2.15.10-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64" }, "product_reference": "automation-controller-0:4.5.5-2.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le" }, "product_reference": "automation-controller-0:4.5.5-2.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x" }, "product_reference": "automation-controller-0:4.5.5-2.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src" }, "product_reference": "automation-controller-0:4.5.5-2.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-0:4.5.5-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64" }, "product_reference": "automation-controller-0:4.5.5-2.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-cli-0:4.5.5-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch" }, "product_reference": "automation-controller-cli-0:4.5.5-2.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-server-0:4.5.5-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch" }, "product_reference": "automation-controller-server-0:4.5.5-2.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-ui-0:4.5.5-2.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch" }, "product_reference": "automation-controller-ui-0:4.5.5-2.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64" }, "product_reference": "automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le" }, "product_reference": "automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x" }, "product_reference": "automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" }, "product_reference": "automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-aiohttp-0:3.9.3-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src" }, "product_reference": "python-aiohttp-0:3.9.3-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64" }, "product_reference": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le" }, "product_reference": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x" }, "product_reference": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64" }, "product_reference": "python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-django-0:4.2.11-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src" }, "product_reference": "python-django-0:4.2.11-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python-pulpcore-0:3.28.24-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src" }, "product_reference": "python-pulpcore-0:3.28.24-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-aiohttp-0:3.9.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64" }, "product_reference": "python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-aiohttp-0:3.9.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le" }, "product_reference": "python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-aiohttp-0:3.9.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x" }, "product_reference": "python3-aiohttp-0:3.9.3-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-aiohttp-0:3.9.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64" }, "product_reference": "python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64" }, "product_reference": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le" }, "product_reference": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x" }, "product_reference": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64" }, "product_reference": "python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch" }, "product_reference": "python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-django-0:4.2.11-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch" }, "product_reference": "python3-django-0:4.2.11-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pulpcore-0:3.28.24-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch" }, "product_reference": "python3-pulpcore-0:3.28.24-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.5-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.5-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.5-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src" }, "product_reference": "receptor-0:1.4.5-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.5-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.5-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.5-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.5-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-39326", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-12-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253330" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39326" }, { "category": "external", "summary": "RHBZ#2253330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-2382", "url": "https://pkg.go.dev/vuln/GO-2023-2382" } ], "release_date": "2023-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" }, { "category": "workaround", "details": "No mitigation is available for this flaw.", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests" }, { "cve": "CVE-2023-41040", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2023-10-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2247040" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in GitPython due to an input validation error when reading from the \".git\" directory. This issue may allow a remote attacker to prepare a specially crafted \".git\" file with directory traversal characters in file names and force the application to read these files from the local system, which can result in checking for the existence of a specific file on the system or allow a denial of service (DoS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "GitPython: Blind local file inclusion", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability cannot be used to read the contents of files but could be used to trigger a denial of service for the program.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41040" }, { "category": "external", "summary": "RHBZ#2247040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247040" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41040", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41040" }, { "category": "external", "summary": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c", "url": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c" } ], "release_date": "2023-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GitPython: Blind local file inclusion" }, { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" }, { "cve": "CVE-2023-46137", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2023-10-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2246264" } ], "notes": [ { "category": "description", "text": "Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-twisted: disordered HTTP pipeline response in twisted.web", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-46137" }, { "category": "external", "summary": "RHBZ#2246264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246264" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-46137", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46137" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-twisted: disordered HTTP pipeline response in twisted.web" }, { "cve": "CVE-2023-47627", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2023-11-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2249825" } ], "notes": [ { "category": "description", "text": "An HTTP request smuggling vulnerability was found in aiohttp. Numerous issues with HTTP parsing can allow an attacker to smuggle HTTP requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-aiohttp: numerous issues in HTTP parser with header parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-47627" }, { "category": "external", "summary": "RHBZ#2249825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249825" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-47627", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-47627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47627" }, { "category": "external", "summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg", "url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-aiohttp: numerous issues in HTTP parser with header parsing" }, { "cve": "CVE-2023-49083", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2023-12-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2255331" } ], "notes": [ { "category": "description", "text": "A null-pointer dereference vulnerability was found in python-cryptography during the loading of PKCS7 certificates. Invoking \"load_pem_pkcs7_certificates\" or \"load_der_pkcs7_certificates\" can trigger this issue and lead to subsequent segmentation fault and result in a Denial of Service (DoS) for any application aiming to deserialize a PKCS7 blob or certificate. The potential impact includes disruptions in system availability and stability.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-cryptography: NULL-dereference when loading PKCS7 certificates", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability arises when functions like \"load_pem_pkcs7_certificates\" or \"load_der_pkcs7_certificates\" are invoked, triggering the issue during the deserialization of PKCS7 blobs or certificates. The moderate rating is based on the fact that the vulnerability can lead to a segmentation fault, posing a risk of disrupting the normal functioning of any application attempting to deserialize the mentioned certificates. While the impact is significant in terms of service denial and potential system instability, the severity is deemed moderate as it does not directly expose sensitive data or allow for remote code execution, focusing primarily on the localized consequences of a DoS scenario.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-49083" }, { "category": "external", "summary": "RHBZ#2255331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-49083", "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-49083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49083" }, { "category": "external", "summary": "https://github.com/pyca/cryptography/commit/f09c261ca10a31fe41b1262306db7f8f1da0e48a", "url": "https://github.com/pyca/cryptography/commit/f09c261ca10a31fe41b1262306db7f8f1da0e48a" }, { "category": "external", "summary": "https://github.com/pyca/cryptography/pull/9926", "url": "https://github.com/pyca/cryptography/pull/9926" }, { "category": "external", "summary": "https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97", "url": "https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97" } ], "release_date": "2023-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-cryptography: NULL-dereference when loading PKCS7 certificates" }, { "acknowledgments": [ { "names": [ "@r3kumar", "@qmuntal" ] } ], "cve": "CVE-2024-1394", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-02-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2262921" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs\u200b. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey\u200b and ctx\u200b. That function uses named return parameters to free pkey\u200b and ctx\u200b if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey\u200b and ctx\u200b will be nil inside the deferred function that should free them.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads", "title": "Vulnerability summary" }, { "category": "other", "text": "The majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-1394" }, { "category": "external", "summary": "RHBZ#2262921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1394", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1394" }, { "category": "external", "summary": "https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136", "url": "https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136" }, { "category": "external", "summary": "https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6", "url": "https://github.com/golang-fips/openssl/security/advisories/GHSA-78hx-gp6g-7mj6" }, { "category": "external", "summary": "https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f", "url": "https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-2660", "url": "https://pkg.go.dev/vuln/GO-2024-2660" }, { "category": "external", "summary": "https://vuln.go.dev/ID/GO-2024-2660.json", "url": "https://vuln.go.dev/ID/GO-2024-2660.json" } ], "release_date": "2024-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads" }, { "cve": "CVE-2024-22195", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2024-01-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257854" } ], "notes": [ { "category": "description", "text": "A cross-site scripting (XSS) flaw was found in Jinja2 due to the xmlattr filter allowing keys with spaces, contrary to XML/HTML attribute standards. If an application accepts user-input keys and renders them for other users, attackers can inject additional attributes, potentially leading to XSS. This misuse of the xmlattr filter enables the injection of arbitrary HTML attributes, bypassing auto-escaping and potentially circumventing attribute validation checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "jinja2: HTML attribute injection when passing user input as keys to xmlattr filter", "title": "Vulnerability summary" }, { "category": "other", "text": "The identified issue is classified as moderate due to a cross-site scripting (XSS) vulnerability in Jinja2. This flaw arises from the xmlattr filter, which permits keys with spaces, contrary to XML/HTML attribute standards. In scenarios where an application accepts user-input keys and renders them for other users, attackers can exploit this vulnerability to inject additional attributes, potentially resulting in XSS attacks. The misuse of the xmlattr filter facilitates the injection of arbitrary HTML attributes, allowing attackers to bypass auto-escaping mechanisms and potentially evade attribute validation checks, posing a moderate security risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22195" }, { "category": "external", "summary": "RHBZ#2257854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22195" }, { "category": "external", "summary": "https://github.com/pallets/jinja/releases/tag/3.1.3", "url": "https://github.com/pallets/jinja/releases/tag/3.1.3" }, { "category": "external", "summary": "https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95", "url": "https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95" } ], "release_date": "2024-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jinja2: HTML attribute injection when passing user input as keys to xmlattr filter" }, { "cve": "CVE-2024-23334", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2024-01-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261887" } ], "notes": [ { "category": "description", "text": "A flaw was found in aiohttp. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option \u0027follow_symlinks\u0027 can be used to determine whether to follow symbolic links outside the static root directory. When \u0027follow_symlinks\u0027 is set to True, there is no validation to check if a given file path is within the root directory. This issue can lead to a directory traversal vulnerability, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present.", "title": "Vulnerability description" }, { "category": "summary", "text": "aiohttp: follow_symlinks directory traversal vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability has been rated as having a moderate impact. There is a non-default precondition which is required to exploit it: the follow_symlinks setting needs to be enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23334" }, { "category": "external", "summary": "RHBZ#2261887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23334", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23334" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23334", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23334" }, { "category": "external", "summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f", "url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f" } ], "release_date": "2024-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" }, { "category": "workaround", "details": "If using follow_symlinks=True outside of a restricted local development environment, disable the option immediately. This option is NOT needed to follow symlinks that point to a location within the static root directory; it is only intended to allow a symlink to break out of the static directory. Even with this CVE fixed, there is still a substantial risk of misconfiguration when using this option on a server that accepts requests from remote users.\n\nAdditionally, aiohttp has always recommended using a reverse proxy server (such as nginx) to handle static resources and not to use these static resources in aiohttp for production environments. Doing so also protects against this vulnerability, and is why we expect the number of affected users to be very low.", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "aiohttp: follow_symlinks directory traversal vulnerability" }, { "cve": "CVE-2024-23829", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2024-01-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261909" } ], "notes": [ { "category": "description", "text": "An HTTP request smuggling vulnerability was found in aiohttp. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets that must trigger error handling to robustly match frame boundaries of proxies in order to protect against the injection of additional requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-aiohttp: http request smuggling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23829" }, { "category": "external", "summary": "RHBZ#2261909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23829", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23829" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23829", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23829" }, { "category": "external", "summary": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2", "url": "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2" } ], "release_date": "2024-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-aiohttp: http request smuggling" }, { "cve": "CVE-2024-24680", "discovery_date": "2024-01-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2261856" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Django. When used with very long strings, the intcomma template filter was subject to a potential denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "Django: denial-of-service in ``intcomma`` template filter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-24680" }, { "category": "external", "summary": "RHBZ#2261856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-24680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24680" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24680", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24680" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-xxj9-f6rv-m3x4", "url": "https://github.com/advisories/GHSA-xxj9-f6rv-m3x4" }, { "category": "external", "summary": "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/", "url": "https://www.djangoproject.com/weblog/2024/feb/06/security-releases/" } ], "release_date": "2024-02-06T15:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Django: denial-of-service in ``intcomma`` template filter" }, { "cve": "CVE-2024-27351", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "discovery_date": "2024-02-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266045" } ], "notes": [ { "category": "description", "text": "An inefficient regular expression complexity flaw was found in the Truncator.words function and truncatewords_html filter of Django. This issue may allow an attacker to use a suitably crafted string to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27351" }, { "category": "external", "summary": "RHBZ#2266045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266045" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27351", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27351" }, { "category": "external", "summary": "https://www.djangoproject.com/weblog/2024/mar/04/security-releases/", "url": "https://www.djangoproject.com/weblog/2024/mar/04/security-releases/" } ], "release_date": "2024-03-04T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-02T19:34:39+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python39-aiohttp-debuginfo-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python39-ansible-runner-0:2.3.6-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-django-0:4.2.11-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python39-pulpcore-0:3.28.24-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-0:3.9.3-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:python3x-aiohttp-debugsource-0:3.9.3-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:python3x-django-0:4.2.11-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:python3x-pulpcore-0:3.28.24-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.5-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-core-1:2.15.10-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:ansible-runner-0:2.3.6-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:ansible-test-1:2.15.10-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:automation-controller-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-cli-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-server-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-ui-0:4.5.5-2.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:automation-controller-venv-tower-0:4.5.5-2.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-0:3.9.3-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python-aiohttp-debugsource-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python-django-0:4.2.11-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python-pulpcore-0:3.28.24-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:python3-aiohttp-debuginfo-0:3.9.3-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:python3-ansible-runner-0:2.3.6-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-django-0:4.2.11-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:python3-pulpcore-0:3.28.24-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.5-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.5-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words()" } ] }
rhsa-2024_4269
Vulnerability from csaf_redhat
Published
2024-07-02 15:00
Modified
2024-12-17 22:46
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.12.12 Images security update
Notes
Topic
Red Hat OpenShift Virtualization release 4.12.12 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 4.12.12 images.
Security Fix(es):
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.12.12 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.12.12 images.\n\nSecurity Fix(es):\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4269", "url": "https://access.redhat.com/errata/RHSA-2024:4269" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "CNV-41510", "url": "https://issues.redhat.com/browse/CNV-41510" }, { "category": "external", "summary": "CNV-41952", "url": "https://issues.redhat.com/browse/CNV-41952" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4269.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.12.12 Images security update", "tracking": { "current_release_date": "2024-12-17T22:46:27+00:00", "generator": { "date": "2024-12-17T22:46:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4269", "initial_release_date": "2024-07-02T15:00:47+00:00", "revision_history": [ { "date": "2024-07-02T15:00:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-02T15:00:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:46:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.12 for RHEL 8", "product": { "name": "CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.12::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.12.12-10" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.12.12-68" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64", "product_id": "container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin\u0026tag=v4.12.12-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm\u0026tag=v4.12.12-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template\u0026tag=v4.12.12-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume\u0026tag=v4.12.12-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template\u0026tag=v4.12.12-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize\u0026tag=v4.12.12-10" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep\u0026tag=v4.12.12-10" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template\u0026tag=v4.12.12-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status\u0026tag=v4.12.12-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64", "product_id": "container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.12.12-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.12.12-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.12.12-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.12.12-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.12.12-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.12.12-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.12.12-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64", "product": { "name": "container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64", "product_id": "container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64", "product": { "name": "container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64", "product_id": "container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.12.12-5" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.12.12-8" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64", "product_id": "container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup\u0026tag=v4.12.12-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64" }, "product_reference": "container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64" }, "product_reference": "container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64", "relates_to_product_reference": "8Base-CNV-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64 as a component of CNV 4.12 for RHEL 8", "product_id": "8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64", "relates_to_product_reference": "8Base-CNV-4.12" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64", "8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64", "8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64", "8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64", "8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64", "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64", "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64", "8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64", "8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64", "8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64", "8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64", "8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64", "8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64" ], "known_not_affected": [ "8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64", "8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64", "8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64", "8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64", "8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64", "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64", "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64", "8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64", "8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64", "8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64", "8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64", "8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64", "8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-02T15:00:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4269" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64", "8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64", "8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64", "8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64", "8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64", "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64", "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64", "8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64", "8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64", "8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64", "8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64", "8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64", "8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.12:container-native-virtualization/bridge-marker@sha256:d0dda6b19805883eb6f7fd01414d9d186469b1def94a48d2e96747d228b5386a_amd64", "8Base-CNV-4.12:container-native-virtualization/cluster-network-addons-operator@sha256:727e02c8a2b8b5f3c5e0cc6080ee824c0ace3ab15c16986124a10e72ee28aad0_amd64", "8Base-CNV-4.12:container-native-virtualization/cnv-containernetworking-plugins@sha256:d49c2e83ddd78029aa4fd44b34d9999d9ce9e58edd8a98fd36491263c9d21428_amd64", "8Base-CNV-4.12:container-native-virtualization/cnv-must-gather-rhel8@sha256:59ff3b1cddbb3bee6175483b3c75f22a52fb236b47b0284b468aa49e8a7f6d6f_amd64", "8Base-CNV-4.12:container-native-virtualization/hco-bundle-registry@sha256:f1ed1de96a233518664503d0ed8496f4efa1a7092b4e1f20082a882b35c396fd_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-csi-driver@sha256:4b5b96b3c0444e67c4297fc4a9f9425f292b6ba685595a08c38d4483b56e8f54_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:2071baed66866393a5773b538bdca0f9c110be7c6afeb5488b3898541fbf09c5_amd64", "8Base-CNV-4.12:container-native-virtualization/hostpath-provisioner-rhel8@sha256:91e35fdc8e75b64559c74b5800bf1abdc837f7ad76cbb9cde32096e0c07c4259_amd64", "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-operator@sha256:d2dba9ae9bfc12b7997f51622011a703f1b7b0e61d9e44a276e40a4561ce8fb4_amd64", "8Base-CNV-4.12:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:81b037f3a81b068300ebaf60d619543ba5629a66eb45b532fdcc8d4709a949a6_amd64", "8Base-CNV-4.12:container-native-virtualization/kubemacpool@sha256:54c5d446dc9ab54381ef75ae10e9114e3cca1dca2c5fa09195bf37f3cf689da3_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-console-plugin@sha256:a8b542d4876bb8b82f5a66bc0d452582b8cffb1e1d66aa2b1651612bb6041c19_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-ssp-operator@sha256:d7925a86d8b4e5f7416e3673a3841a59629ee4183da03e2002debf31744458bc_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:1779baece47a0e5816f3ee67e96ed99a67441b9ae7a3d73c50398e40c0a1baa0_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:336fea863a0a538295876cb1164d3c4c6038dd463ed38a20a97127d85f3cd004_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:57c136f41f5342dc0a20155b43435a184f4227804a436075276e38390e7ad69c_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:df422f53becac90e8a075048a2624a379c209b281d376059a5b9d1ef5d262903_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c6644084f4584bc06e8314162090f5053d9ff2319721615407eb3e7c5415f58a_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:621f110b8c30676ed47a56089938d344a7f2708e5dc8fe168a1821af45a29959_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:b7b41226f53d95c4abf8ecd9ddac626e4df20f6d5df963bdea5f46b90c8872c6_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:68992af891953d888e87cb998ef02997b46affb6de8ba665cddaeb7c10d6651d_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:7092d7493cb6a4f4faec294119f6be312753ed4fa6cfe0ada65fa81a233da2a3_amd64", "8Base-CNV-4.12:container-native-virtualization/kubevirt-template-validator@sha256:c5427d8441f9be1fa918836af7fcab89a436c08c4f06ebdcc0f885697078ddda_amd64", "8Base-CNV-4.12:container-native-virtualization/libguestfs-tools@sha256:cd5dd79471cf8339d61d0c337c6c7aa2a067209c57495e82587534b673899f0c_amd64", "8Base-CNV-4.12:container-native-virtualization/ovs-cni-marker@sha256:3dc7177d76b55a699408f550e31b7b8a270066d029afe74f186e8516192d140b_amd64", "8Base-CNV-4.12:container-native-virtualization/ovs-cni-plugin@sha256:eb5ecafa605a4c5d20f52cb6147253660092715241def2fe64f7222afa2ab254_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-api@sha256:e90c32eb92031ee1aacc50b6dd0ffbeae817c2f55deea56a415eb98c3b727935_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-artifacts-server@sha256:ee7c3ab336f8a5617ba930610d942bfd67f39fffec6cd7a2ab95d7f2857acd87_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-apiserver@sha256:019d5b88e542f88b1429534d0bccfef3252b95b4930cb8f224694ce104a19bdd_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-cloner@sha256:13c0401be1a5d7a057f35c892d938d0dae74da1f083b402eefd4b0ed29cad475_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-controller@sha256:119e0f963c9c147ca075ca466f861b5135663db109f092ed23c66ee881468086_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-importer@sha256:8324d439541da3938d6eb42a3615e8fae56a29bf3c28f61cc05113f6610a3931_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-operator@sha256:6dc55de73b78b93271a2b068e7b89d4c2ce4497df6dd668ca8b81c9bcb091be1_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadproxy@sha256:e42a5394b2671f8a881d0687d687c45f3ac59652fc27e129e212bd5cf743a319_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-cdi-uploadserver@sha256:a8b28537cc2b552787a06eaca1d56b82dd81dc9c792767ef09c735cc2f128f00_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-controller@sha256:0e60ae73bd4e3f3ac141858887c618680e0da12956f7f11948bd720e47fdce95_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-exportproxy@sha256:83800c207a74a2bb73efb7cdaa5cb074fa59802cce53c22cd7c909ac9568b4a8_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-exportserver@sha256:361f7d2c05c75083863d35a282895ce2c0b35df7ec4b4cefd0518cd25e952879_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-handler@sha256:76efc33dabc0cb68f845222cc71a2b44a003c13b1b31bb0519c470747508237a_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-launcher@sha256:9b34bad84b6df588c97e4db9f7aaadf4e028b75b262fb5a37e3b28ef7f194730_amd64", "8Base-CNV-4.12:container-native-virtualization/virt-operator@sha256:8a1c199fd369bc5db46febe8fbf1b876f2950a9c7ef42fd1ee1868693799a13c_amd64", "8Base-CNV-4.12:container-native-virtualization/virtio-win@sha256:8ef5c4527ad5c65a60bd523563d59acfc14346be18e43004e49afcac91d20733_amd64", "8Base-CNV-4.12:container-native-virtualization/vm-network-latency-checkup@sha256:f91b90a3b09a5097494743b93b49ec007d0263750a11df1444266f91bd3a3503_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" } ] }
rhsa-2024_3473
Vulnerability from csaf_redhat
Published
2024-05-29 15:48
Modified
2024-12-17 22:43
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.14.6 Images security update
Notes
Topic
Red Hat OpenShift Virtualization release 4.14.6 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 4.14.6 images.
Security Fix(es):
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.14.6 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.14.6 images.\n\nSecurity Fix(es):\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3473", "url": "https://access.redhat.com/errata/RHSA-2024:3473" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2023-45857", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "CNV-36026", "url": "https://issues.redhat.com/browse/CNV-36026" }, { "category": "external", "summary": "CNV-39569", "url": "https://issues.redhat.com/browse/CNV-39569" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3473.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.14.6 Images security update", "tracking": { "current_release_date": "2024-12-17T22:43:45+00:00", "generator": { "date": "2024-12-17T22:43:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:3473", "initial_release_date": "2024-05-29T15:48:02+00:00", "revision_history": [ { "date": "2024-05-29T15:48:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-05-29T15:48:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:43:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.14 for RHEL 9", "product": { "name": "CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.14::el9" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.14.6-4" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.14.6.rhel9-179" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64", "product": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64", "product_id": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-apiserver-proxy-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.14.6-195" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.14.6-8" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.14.6-4" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.14.6-2" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64", "product": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64", "product_id": "container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-controller-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64", "product": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64", "product_id": "container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-lock-server-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64", "product": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64", "product_id": "container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-operator-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64", "product": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64", "product_id": "container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64", "product_identification_helper": { "purl": "pkg:oci/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/pr-helper-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.14.6-1" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.14.6-4" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.14.6.rhel9-179" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64", "product": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64", "product_id": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-apiserver-proxy-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.14.6-195" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.14.6-8" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.14.6-4" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.14.6-2" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64", "product": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64", "product_id": "container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-controller-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64", "product": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64", "product_id": "container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-lock-server-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64", "product": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64", "product_id": "container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-operator-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64", "product": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64", "product_id": "container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64", "product_identification_helper": { "purl": "pkg:oci/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/pr-helper-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.14.6-3" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.14.6-1" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.14.6-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64" }, "product_reference": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64" }, "product_reference": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64" }, "product_reference": "container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64" }, "product_reference": "container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64" }, "product_reference": "container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64" }, "product_reference": "container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64" }, "product_reference": "container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64" }, "product_reference": "container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64" }, "product_reference": "container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64" }, "product_reference": "container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64", "relates_to_product_reference": "9Base-CNV-4.14" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64 as a component of CNV 4.14 for RHEL 9", "product_id": "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64", "relates_to_product_reference": "9Base-CNV-4.14" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64", "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64", "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64", "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64", "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64", "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64", "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64", "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64", "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64", "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64", "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64", "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64", "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64", "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64", "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64", "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64", "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64", "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64", "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64", "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64", "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64", "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64", "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64", "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64", "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64", "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64", "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64", "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64", "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64", "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64", "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64" ], "known_not_affected": [ "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64", "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64", "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64", "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64", "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64", "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64", "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64", "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64", "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64", "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64", "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64", "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64", "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64", "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64", "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64", "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64", "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64", "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64", "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64", "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64", "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64", "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64", "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64", "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64", "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64", "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64", "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64", "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64", "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64", "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64", "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-29T15:48:02+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3473" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64", "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64", "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64", "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64", "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64", "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64", "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64", "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64", "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64", "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64", "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64", "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64", "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64", "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64", "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64", "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64", "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64", "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64", "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64", "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64", "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64", "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64", "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64", "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64", "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64", "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64", "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64", "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64", "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64", "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64", "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:4227bfb6100fcec336ea1a8034f1aecb0861d07d26ebf9487a4a145a9df50b53_amd64", "9Base-CNV-4.14:container-native-virtualization/bridge-marker-rhel9@sha256:639585e4679ac391d08650b9400bc4b60aec11c6ffaee475733b689ea8e4cadc_arm64", "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:19bde57fb40cbdbae89a3607752d52b0066f5be773206014c8355c1212162229_arm64", "9Base-CNV-4.14:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:775f9b9ad0ae569a9140e4a7a05c22b184573b5b463036dbc86fd4f2c4a25c78_amd64", "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:00d566b33cf6ed77bbcb7799bcedc027fc27325a2c9bcba0b570e43567154d6e_amd64", "9Base-CNV-4.14:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:e3939de05b6da8e0abe8f563f4fd6539d8609e660c42c8838c7ee12dae6ed372_arm64", "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:51b9251dab6504df1b278dc5189ea62512d13c107233d2008c584fe43ef4fa2d_arm64", "9Base-CNV-4.14:container-native-virtualization/cnv-must-gather-rhel9@sha256:e38828943ceff82ace62760df8cb76b8f54201d335bcf20c8a401ba51aee9790_amd64", "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:1381ecaed442162e985372cfc07d8189fbe3cef4a32f801d6838c1d9c669b1e2_arm64", "9Base-CNV-4.14:container-native-virtualization/hco-bundle-registry-rhel9@sha256:74a9c0ab80a851f5784e2a6e5d4a51b9f43e2d2c7e8efc732b19b72b2e6352a7_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:363a3e53ff526890421817fc89f57e2e3a8f4ee3c40d937c0bbab519973b4079_arm64", "9Base-CNV-4.14:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:c0b66babecdd830e944e991f331bafb104cc5c203028a12088004dd8eeb0c8d9_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:1c6d9c60ec73a64433dcdd1675d0e4cc8a5fc90ea908329b8afe1b2d8782a411_arm64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:f7fe1178a205441b0642baca5d9c6a26d8dcf2f515930cfa6ee5975ca14b3a48_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:0a51c4d032a032f5bb27249dd3eed8f20e09301740d4b69020d8803eb40f840b_amd64", "9Base-CNV-4.14:container-native-virtualization/hostpath-provisioner-rhel9@sha256:13c4e9e02600414484fb7a231597256e90fbd587b71d836771b7a794c4bf8d62_arm64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:437cc3bbab2422e7419f786621e7a2098168b81c7fb96513b105ded0e12ceaff_arm64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:a9d8563a8b104ee29a860d788dc2c2d9a8cc74255261d93bd7fe4e92d3b03fe6_amd64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7433a3efdf8cacdac903228815f33f5cc4bee706b1328ab9635e206474199e6f_amd64", "9Base-CNV-4.14:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:ea09a1a79fff02ca0ce74433384e338c3674bda72d40403a2e7bb6145b3f0ecb_arm64", "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:93efe34fb309b9d9d1b36f167976baf65a297b0b8a6d32ce67160889dc4ad733_arm64", "9Base-CNV-4.14:container-native-virtualization/kubemacpool-rhel9@sha256:ccac3c377544f9bc8c89a1260bf24b9ee8d4d2d0c857a76188db556831a856bb_amd64", "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:2cae124766b49ee4e07a83c7d0929279e4161301dbc0bdeb0cd1932e35ecd24a_arm64", "9Base-CNV-4.14:container-native-virtualization/kubesecondarydns-rhel9@sha256:dde5f89908f70c742e9461cf19d98b1482834eb2b3dad3f5b838df5054b39181_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:177d2a0a12b6c6fe5d261d524bc9c09760099f959edcffae7d8bc925f170db8f_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:4308ce352c73fb1f0df923a57f4b949ea97e940310694a7e7b569e217bef6fbb_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:0e6f4edef8b0ccecb3f638f664febe5443e5281c1b6b79894215e67240cfac46_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:e2fedd04de0acf0bd947d69709bdbe6e726bccbdd74fa9619a7ae553add22a52_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:6c21c65dc271f36d9215c31976a35d66f66b7902170347ae0097a1060522845e_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:d2c70db580c6610bdbf1420c831b7aef658fa1d64938bfdd366d5fa493d2c04a_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:2e3979851f3b32c869de3e0bf1148abb859451868a04fd7f33bd6ea34f45a250_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:44bc36ca60c6c25c71796c2449d90f210eb577b0f2f8734ae0f3e44d01a9ac2c_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:1d0bb5322bf9c035b216f9a560fddd5cf44e78f9a8793b0a75abb73659e8bab1_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:87615f0c6d8f1d509d6bfe330d4d671008bb83ab6555887a7d510fd13db85c6d_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:0f29cd8779347683fd469d697bf582b31770dfe0fc5aea101e06824a76801fdb_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:ea682d53999b5e49f68b32007af35e24271a149ed392c2bea31218242cc86e05_amd64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:2d43903a285a361ebf7bb348809ab9b8cd9f413a57031247db82c611f1abce4f_arm64", "9Base-CNV-4.14:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:beeeee2fc3073a0e02a7cb1f87660c799deeb9fcdb1702bf870fd1934469af50_amd64", "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:9c718cf14f8a8897e80d186e2db67061b29851d0066b20743b2cca228960dfe6_arm64", "9Base-CNV-4.14:container-native-virtualization/libguestfs-tools-rhel9@sha256:f840943da632c85536faea8e62c3faedae113f539af46b17641dd84fcb0cccb8_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:552dad2ca8669ff1a2a05c40de39a237feefbb308872b1eec7baf70a545215bc_arm64", "9Base-CNV-4.14:container-native-virtualization/mtq-controller-rhel9@sha256:8e4b0467ad06adbfc4f03421025d00b9c1ac0d2d9a7552a46f66588d1eb35a18_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:d3920d5a2ed229da22f73d42090df015320e4e658959e2a6b55208e86725f4a8_arm64", "9Base-CNV-4.14:container-native-virtualization/mtq-lock-server-rhel9@sha256:fc7a1a6c05fc355a4694ed98978aa2a110615413ac7117810a7bf8ca3a692a79_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:3b9a11d2be3ede19dd4addba9a02cf13236f7602f89b7ccbc965a7cc0e4e2ac5_amd64", "9Base-CNV-4.14:container-native-virtualization/mtq-operator-rhel9@sha256:710a918d2e94e4206db8543af27a400d66781c7cf14d806197a0beae03702472_arm64", "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8b429939dbe346b24020dbbd68e87379651b9282fca85c7fe583ded826c0edaa_amd64", "9Base-CNV-4.14:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:f28ba0508523f060a321ef5c5103b8a1c34103c2c00867dfbbfa3e35259727e5_arm64", "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:344b37d60fa9eb6cc5d45ba9def06eff5ddb88460aee49e3fe77a5043e7b78c5_amd64", "9Base-CNV-4.14:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:991661d27fb201ad7ff87024b5acf9a5a3bfe85eb56efbe0f5b1a70516a67c4e_arm64", "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:5f3e87cd55b19cc8ae2884513f882e8e62bc9d981ff5282bc995b5822d0f7799_amd64", "9Base-CNV-4.14:container-native-virtualization/pr-helper-rhel9@sha256:64219f95a05a6d542f40cd3b76a9f70d000d0ee85d23b342c7ea9e2977e14dd8_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:a8ffc4436985f107b893eec058febc286e5273fbc82f033878829cb4e8fc97b4_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-api-rhel9@sha256:ed25474a822ec4fa6d944888333320e7175833619e262ec06e35efd69f9eacee_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:b275ba87cb7f84ba4171b45ad784b5065ff5242f1040a5d377120a4c0e526b68_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cbf516049f392bb6260e7c50e1c7687ca5a65c983485d45470957e7d13e7ec84_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:4e150aacdf1351cfc7600ef7d7f8df9f58d7e6fec2ec48a50dda579470ff0a61_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:ef217d3459d9eb9ae5fa19f6baa105006e52d93541d35802a4271bef32b700ca_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:2c6b51be73cac25c2732cb124caeb256bb3febc3693bd556deb2a0d155b08082_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:7f72b2ce080793c5a8b37640f32ccdac537e13fabcd7c95f89bb824aee04aee9_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:7fd39c97dbc36af9f0facb6c571dcd9c2352bee5a893d690b0fe6b08ca43aa77_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-controller-rhel9@sha256:c2d901024f6d153666381391a5cc36ba13b7145f5432385b3c6bc8070b1f5c1e_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:41ee5a40f70e41a407e8b431eaacafc4ff2644f321b1e6a14093ffddf08be211_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-importer-rhel9@sha256:e98160583d1138cce8b18a51995ac413577f8314ba6c08cfeceaa830590e676e_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:3e89a5f69f2de311ab4fab7bb50adc8bb7f558efe45b84b9344b776189bd9978_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-operator-rhel9@sha256:a76fe0b13bfdbd9c8f5f083ce119d6b5da9cb221883d83b8484d914cd1b0cd46_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:7084c2245c7b620f5854b589d8b66e6e45d0d2ced00df0eb745e064685e1efe6_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:e43e3031150ab722542db845aad339f925725ef6c1770119daa7f28579bc4474_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:2d9a998c9d6092e002c803bdd410c8a4fec6bf89e8e9373c050728c8bb4c5ab7_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8b923c77cb108be1c67a119a601f9628c7ea788bd7946a5a523239b3fffb40ea_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:a3005035973b8e81c43bfb305d061f9a6adbacc8ef0abb4c0d456f872b60bb57_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-controller-rhel9@sha256:da96b63778745c6ce7b1d4451ceb2f9d8d81ae0884bd8c3e3d88f6a51dee9bd7_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:19c51e43f9d151b93709f4fb08c4e420994bfd3bf26ada22f8f0eb0c28d4f196_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportproxy-rhel9@sha256:cad32e4fd7b6155645e698765a280fdf7038eef58cf29afb902c15d3c987791f_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:02e276071d7652ff6de5bdad69cdf1d948ea2fd388e77ed3351d004b49ed7e07_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-exportserver-rhel9@sha256:13be9ba139857db816e44dc9d076e68ee18f42e9431978bf787df9108957b369_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:9ccb0795d813162f11e60a9147149686738a33cddf6a0767a6727b1ab8884bf0_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-handler-rhel9@sha256:fae61492eda528d968bcd1568fec3f697832ab4baf645824b8402021575330fc_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:917a580de46b63dd5cbc364d65bf343195801cf779c7d7e381a88367ea286ad2_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-launcher-rhel9@sha256:de48f0ed447bc04b7c1494c2f4532b1d805837b126a6641e30eb35eee6198b48_arm64", "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:0a96121b2b588346bfceaf1aa403afd8658d31f5990175bc5c8fc943d99d66cc_amd64", "9Base-CNV-4.14:container-native-virtualization/virt-operator-rhel9@sha256:5868b81c167118ba1bfee450fb057c3eca756031ddad4ef8471ff46da58f1e12_arm64", "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:1e33cf22ce1a4b37ad8c2ceac4b068792793bca6b86bb8cfbdb281937fd174b5_arm64", "9Base-CNV-4.14:container-native-virtualization/virtio-win-rhel9@sha256:9e4ff4cb81b246f0476ab7f300948223208b4c5e43e764a95830c0a2aca700f8_amd64", "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:b133beebc86c87c37504fdfd142645921942ae8c52a232857c90c82054ee4ca3_arm64", "9Base-CNV-4.14:container-native-virtualization/vm-console-proxy-rhel9@sha256:cc07c875e19a1b5b41e6337c8fb3f4f96ecfff3d4ed3c05f39fabeb14b37aad2_amd64", "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:27d75636884ca61fa0d5b753a4de9c960406293c3ae5c06abf3bedb4982a5b11_arm64", "9Base-CNV-4.14:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:d029dbfc1677621c536c3bdb366fb0952571bfd7f34461289e8dfdab2a0acb55_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" } ] }
rhsa-2024_3920
Vulnerability from csaf_redhat
Published
2024-06-13 11:02
Modified
2024-12-17 22:44
Summary
Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update
Notes
Topic
Migration Toolkit for Runtimes 1.2.6 release
Red Hat Product Security has rated this update as having a security impact of Important.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Migration Toolkit for Runtimes 1.2.6 ZIP artifacts
Security Fix(es):
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
* follow-redirects: Possible credential leak (CVE-2024-28849)
* commons-configuration2: various flaws (CVE-2024-29131)
* commons-configuration2: various flaws (CVE-2024-29133)
* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Migration Toolkit for Runtimes 1.2.6 release\nRed Hat Product Security has rated this update as having a security impact of Important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Migration Toolkit for Runtimes 1.2.6 ZIP artifacts\n\nSecurity Fix(es):\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n* follow-redirects: Possible credential leak (CVE-2024-28849)\n* commons-configuration2: various flaws (CVE-2024-29131)\n* commons-configuration2: various flaws (CVE-2024-29133)\n* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3920", "url": "https://access.redhat.com/errata/RHSA-2024:3920" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=migration.toolkit.runtimes\u0026downloadType=distributions", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=migration.toolkit.runtimes\u0026downloadType=distributions" }, { "category": "external", "summary": "WINDUPRULE-1049", "url": "https://issues.redhat.com/browse/WINDUPRULE-1049" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3920.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update", "tracking": { "current_release_date": "2024-12-17T22:44:47+00:00", "generator": { "date": "2024-12-17T22:44:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:3920", "initial_release_date": "2024-06-13T11:02:36+00:00", "revision_history": [ { "date": "2024-06-13T11:02:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-06-13T11:02:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:44:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Migration Toolkit for Runtimes 1 on RHEL 8", "product": { "name": "Migration Toolkit for Runtimes 1 on RHEL 8", "product_id": "Migration Toolkit for Runtimes 1 on RHEL 8", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8" } } } ], "category": "product_family", "name": "Migration Toolkit for Runtimes" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-13T11:02:36+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3920" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-03-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2269576" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the follow-redirects package. While processing the cross-domain redirection, `follow-redirects` clears authorization headers, however, it misses clearing proxy-authentication headers, which contain credentials as well. This issue may lead to credential leaking, having a high impact on data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Possible credential leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28849" }, { "category": "external", "summary": "RHBZ#2269576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849" }, { "category": "external", "summary": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp", "url": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-13T11:02:36+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3920" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Possible credential leak" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270674" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Commons-Configuration2, where a Stack Overflow Error can occur when adding a property in AbstractListDelimiterHandler.flattenIterator(). This issue could allow an attacker to corrupt memory or execute a denial of service attack by crafting malicious property that triggers an out-of-bounds write issue when processed by the vulnerable method.", "title": "Vulnerability description" }, { "category": "summary", "text": "commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29131" }, { "category": "external", "summary": "RHBZ#2270674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29131" }, { "category": "external", "summary": "https://github.com/apache/commons-configuration/commit/56b5c4dcdffbde27870df5a3105d6a5f9b22f554", "url": "https://github.com/apache/commons-configuration/commit/56b5c4dcdffbde27870df5a3105d6a5f9b22f554" }, { "category": "external", "summary": "https://github.com/apache/commons-configuration/commit/7d7d399d0598cb0ca5f81891de34694178156dab", "url": "https://github.com/apache/commons-configuration/commit/7d7d399d0598cb0ca5f81891de34694178156dab" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/CONFIGURATION-840", "url": "https://issues.apache.org/jira/browse/CONFIGURATION-840" } ], "release_date": "2024-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-13T11:02:36+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3920" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270673" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Commons-Configuration2, where a Stack Overflow Error occurs when calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree. This issue could allow an attacker to trigger an out-of-bounds write that could lead to memory corruption or cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29133" }, { "category": "external", "summary": "RHBZ#2270673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29133" }, { "category": "external", "summary": "https://github.com/apache/commons-configuration/commit/43f4dab021e9acb8db390db2ae80aa0cee4f9ee4", "url": "https://github.com/apache/commons-configuration/commit/43f4dab021e9acb8db390db2ae80aa0cee4f9ee4" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/CONFIGURATION-841", "url": "https://issues.apache.org/jira/browse/CONFIGURATION-841" } ], "release_date": "2024-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-13T11:02:36+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3920" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree" }, { "cve": "CVE-2024-29180", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270863" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webpack-dev-middleware package, where it failed to validate the supplied URL address sufficiently before returning local files. This flaw allows an attacker to craft URLs to return arbitrary local files from the developer\u0027s machine. The lack of normalization before calling the middleware also allows the attacker to perform path traversal attacks on the target environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "webpack-dev-middleware: lack of URL validation may lead to file leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in webpack-dev represents a important security issue due to its potential to expose sensitive files and compromise developer machines. By failing to validate URLs and normalize paths effectively, the middleware allows attackers to craft malicious requests that can retrieve arbitrary local files or perform unauthorized path traversal. This could lead to unauthorized access to confidential information, including source code, configuration files, and even system-level files. Given the widespread use of webpack-dev-middleware in web development environments, addressing this vulnerability promptly is important to prevent serious data breaches and protect the integrity of development processes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29180" }, { "category": "external", "summary": "RHBZ#2270863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180" }, { "category": "external", "summary": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6", "url": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6" } ], "release_date": "2024-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-13T11:02:36+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3920" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Migration Toolkit for Runtimes 1 on RHEL 8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webpack-dev-middleware: lack of URL validation may lead to file leak" } ] }
rhsa-2024_3316
Vulnerability from csaf_redhat
Published
2024-05-23 06:39
Modified
2024-12-17 22:43
Summary
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
Notes
Topic
Migration Toolkit for Applications 7.0.3 release
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Migration Toolkit for Applications 7.0.3 Images
Security Fix(es) from Bugzilla:
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
* css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)
* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)
* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)
* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
* css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)
* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* follow-redirects: Possible credential leak (CVE-2024-28849)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Migration Toolkit for Applications 7.0.3 release\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Migration Toolkit for Applications 7.0.3 Images\n\nSecurity Fix(es) from Bugzilla:\n\n* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)\n\n* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\n* css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)\n\n* go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 (CVE-2023-45286)\n\n* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)\n\n* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)\n\n* css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)\n\n* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)\n\n* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)\n\n* follow-redirects: Possible credential leak (CVE-2024-28849)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3316", "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "2250364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250364" }, { "category": "external", "summary": "2252012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012" }, { "category": "external", "summary": "2253193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193" }, { "category": "external", "summary": "2253330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330" }, { "category": "external", "summary": "2254559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559" }, { "category": "external", "summary": "2256413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413" }, { "category": "external", "summary": "2268046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046" }, { "category": "external", "summary": "2268273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273" }, { "category": "external", "summary": "2269576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576" }, { "category": "external", "summary": "2270863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863" }, { "category": "external", "summary": "MTA-1578", "url": "https://issues.redhat.com/browse/MTA-1578" }, { "category": "external", "summary": "MTA-1959", "url": "https://issues.redhat.com/browse/MTA-1959" }, { "category": "external", "summary": "MTA-1961", "url": "https://issues.redhat.com/browse/MTA-1961" }, { "category": "external", "summary": "MTA-1970", "url": "https://issues.redhat.com/browse/MTA-1970" }, { "category": "external", "summary": "MTA-1997", "url": "https://issues.redhat.com/browse/MTA-1997" }, { "category": "external", "summary": "MTA-2003", "url": "https://issues.redhat.com/browse/MTA-2003" }, { "category": "external", "summary": "MTA-2117", "url": "https://issues.redhat.com/browse/MTA-2117" }, { "category": "external", "summary": "MTA-2186", "url": "https://issues.redhat.com/browse/MTA-2186" }, { "category": "external", "summary": "MTA-2224", "url": "https://issues.redhat.com/browse/MTA-2224" }, { "category": "external", "summary": "MTA-2243", "url": "https://issues.redhat.com/browse/MTA-2243" }, { "category": "external", "summary": "MTA-2287", "url": "https://issues.redhat.com/browse/MTA-2287" }, { "category": "external", "summary": "MTA-2308", "url": "https://issues.redhat.com/browse/MTA-2308" }, { "category": "external", "summary": "MTA-2314", "url": "https://issues.redhat.com/browse/MTA-2314" }, { "category": "external", "summary": "MTA-2341", "url": "https://issues.redhat.com/browse/MTA-2341" }, { "category": "external", "summary": "MTA-2380", "url": "https://issues.redhat.com/browse/MTA-2380" }, { "category": "external", "summary": "MTA-2400", "url": "https://issues.redhat.com/browse/MTA-2400" }, { "category": "external", "summary": "MTA-2409", "url": "https://issues.redhat.com/browse/MTA-2409" }, { "category": "external", "summary": "MTA-2410", "url": "https://issues.redhat.com/browse/MTA-2410" }, { "category": "external", "summary": "MTA-2426", "url": "https://issues.redhat.com/browse/MTA-2426" }, { "category": "external", "summary": "MTA-2427", "url": "https://issues.redhat.com/browse/MTA-2427" }, { "category": "external", "summary": "MTA-2451", "url": "https://issues.redhat.com/browse/MTA-2451" }, { "category": "external", "summary": "MTA-2452", "url": "https://issues.redhat.com/browse/MTA-2452" }, { "category": "external", "summary": "MTA-2495", "url": "https://issues.redhat.com/browse/MTA-2495" }, { "category": "external", "summary": "MTA-2503", "url": "https://issues.redhat.com/browse/MTA-2503" }, { "category": "external", "summary": "MTA-2505", "url": "https://issues.redhat.com/browse/MTA-2505" }, { "category": "external", "summary": "MTA-2512", "url": "https://issues.redhat.com/browse/MTA-2512" }, { "category": "external", "summary": "MTA-2513", "url": "https://issues.redhat.com/browse/MTA-2513" }, { "category": "external", "summary": "MTA-2518", "url": "https://issues.redhat.com/browse/MTA-2518" }, { "category": "external", "summary": "MTA-2550", "url": "https://issues.redhat.com/browse/MTA-2550" }, { "category": "external", "summary": "MTA-2560", "url": "https://issues.redhat.com/browse/MTA-2560" }, { "category": "external", "summary": "MTA-2563", "url": "https://issues.redhat.com/browse/MTA-2563" }, { "category": "external", "summary": "MTA-2616", "url": "https://issues.redhat.com/browse/MTA-2616" }, { "category": "external", "summary": "MTA-2652", "url": "https://issues.redhat.com/browse/MTA-2652" }, { "category": "external", "summary": "MTA-2654", "url": "https://issues.redhat.com/browse/MTA-2654" }, { "category": "external", "summary": "MTA-2661", "url": "https://issues.redhat.com/browse/MTA-2661" }, { "category": "external", "summary": "MTA-2681", "url": "https://issues.redhat.com/browse/MTA-2681" }, { "category": "external", "summary": "MTA-2781", "url": "https://issues.redhat.com/browse/MTA-2781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3316.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:43:26+00:00", "generator": { "date": "2024-12-17T22:43:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:3316", "initial_release_date": "2024-05-23T06:39:32+00:00", "revision_history": [ { "date": "2024-05-23T06:39:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-05-23T06:39:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:43:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MTA 7.0 for RHEL 9", "product": { "name": "MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el9" } } }, { "category": "product_name", "name": "MTA 7.0 for RHEL 8", "product": { "name": "MTA 7.0 for RHEL 8", "product_id": "8Base-MTA-7.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_applications:7.0::el8" } } } ], "category": "product_family", "name": "Migration Toolkit for Applications" }, { "branches": [ { "category": "product_version", "name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "product": { "name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "product_id": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-addon-rhel9\u0026tag=7.0.3-13" } } }, { "category": "product_version", "name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "product": { "name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "product_id": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.3-13" } } }, { "category": "product_version", "name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "product": { "name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "product_id": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.3-16" } } }, { "category": "product_version", "name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "product": { "name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "product_id": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=7.0.3-10" } } }, { "category": "product_version", "name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "product": { "name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "product_id": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=7.0.3-25" } } }, { "category": "product_version", "name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "product": { "name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "product_id": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=7.0.3-7" } } }, { "category": "product_version", "name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "product": { "name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "product_id": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=7.0.3-13" } } }, { "category": "product_version", "name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64", "product": { "name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64", "product_id": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.3-12" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "product": { "name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "product_id": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "product_identification_helper": { "purl": "pkg:oci/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-analyzer-lsp-rhel9\u0026tag=7.0.3-13" } } }, { "category": "product_version", "name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "product": { "name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "product_id": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "product_identification_helper": { "purl": "pkg:oci/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-cli-rhel9\u0026tag=7.0.3-16" } } }, { "category": "product_version", "name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "product": { "name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "product_id": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "product_identification_helper": { "purl": "pkg:oci/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092?arch=arm64\u0026repository_url=registry.redhat.io/mta/mta-windup-shim-rhel9\u0026tag=7.0.3-12" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64 as a component of MTA 7.0 for RHEL 8", "product_id": "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64" }, "product_reference": "mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "relates_to_product_reference": "8Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64" }, "product_reference": "mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64" }, "product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64" }, "product_reference": "mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64" }, "product_reference": "mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64" }, "product_reference": "mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64" }, "product_reference": "mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64" }, "product_reference": "mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" }, "product_reference": "mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64" }, "product_reference": "mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "relates_to_product_reference": "9Base-MTA-7.0" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64 as a component of MTA 7.0 for RHEL 9", "product_id": "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" }, "product_reference": "mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64", "relates_to_product_reference": "9Base-MTA-7.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-26159", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256413" } ], "notes": [ { "category": "description", "text": "An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()", "title": "Vulnerability summary" }, { "category": "other", "text": "follow-redirects is a transitive dependency of Grafana, and does not affect Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26159" }, { "category": "external", "summary": "RHBZ#2256413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26159", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159" } ], "release_date": "2024-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()" }, { "cve": "CVE-2023-26364", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-11-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2250364" } ], "notes": [ { "category": "description", "text": "A flaw was found in Adobe CSS Tools. An improper input validation could result in a minor denial of service while parsing a malicious CSS with the parse component. User interaction and privileges are not required to jeopardize an environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "css-tools: Improper Input Validation causes Denial of Service via Regular Expression", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26364" }, { "category": "external", "summary": "RHBZ#2250364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26364" }, { "category": "external", "summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg", "url": "https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg" } ], "release_date": "2023-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "No mitigation is yet available for this vulnerability.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "css-tools: Improper Input Validation causes Denial of Service via Regular Expression" }, { "cve": "CVE-2023-39326", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-12-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253330" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39326" }, { "category": "external", "summary": "RHBZ#2253330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-2382", "url": "https://pkg.go.dev/vuln/GO-2023-2382" } ], "release_date": "2023-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "No mitigation is available for this flaw.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests" }, { "cve": "CVE-2023-45286", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2023-11-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2252012" } ], "notes": [ { "category": "description", "text": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn\u0027t had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45286" }, { "category": "external", "summary": "RHBZ#2252012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45286" } ], "release_date": "2023-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2" }, { "cve": "CVE-2023-45287", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "discovery_date": "2023-12-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253193" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/tls standard library. In previous versions, the package was vulnerable to a Timing Side Channel attack by observing the time it took for RSA-based TLS key exchanges, which was not constant. This flaw allows a malicious user to gather information from the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.", "title": "Vulnerability summary" }, { "category": "other", "text": "The identified flaw in the Golang crypto/tls library, is assessed as a moderate severity issue rather than important due to several mitigating factors. Although the vulnerability exposes a Timing Side Channel, potentially allowing information retrieval through RSA-based TLS key exchanges, its exploitation demands significant access and expertise. Additionally, while earlier versions implemented RSA blinding to counter timing attacks, the removal of PKCS#1 padding may still leak timing data. However, the practicality of exploiting this flaw is limited, and the transition to a fully constant time RSA implementation in Go 1.20 significantly bolsters security, reducing the risk posed by timing side channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45287" }, { "category": "external", "summary": "RHBZ#2253193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-2375", "url": "https://pkg.go.dev/vuln/GO-2023-2375" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "No current mitigation is available for this vulnerability.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges." }, { "acknowledgments": [ { "names": [ "Bartek Nowotarski" ], "organization": "nowotarski.info" } ], "cve": "CVE-2023-45288", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-03-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2268273" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst case scenario resulting in a denial of service. It is simple to exploit, could significantly impact availability, and there is not a suitable mitigation for all use cases. Once an attack has ended, the system should return to normal operations on its own.\n\nThis vulnerability only impacts servers which have HTTP/2 enabled. It stems from an imperfect definition of the protocol. As the Go programming language is widely utilized across nearly every major Red Hat offering, a full listing of impacted packages will not be provided. Therefore, the \u201cAffected Packages and Issued Red Hat Security Errata\u201d section contains a simplified list of what offerings need to remediate this vulnerability. Every impacted offering has at least one representative component listed, but potentially not all of them. Rest assured that Red Hat is committed to remediating this vulnerability across our entire portfolio.\n\nMany components are rated as Low impact due to configurations which reduce the attack surface or significantly increase the difficulty of exploitation. A summary of these scenarios are:\n* The container includes a package that provides a vulnerable webserver, but it is not used or running during operation\n* HTTP/2 is disabled by default and is not supported\n* Only a client implementation is provided, which is not vulnerable\n* A vulnerable module (either golang.org/net/http or golang.org/x/net/http2) is included, but disabled\n* Access to a vulnerable server is restricted within the container (loopback only connections)\n* Golang is available in the container but is not used\n\n\nWithin the Red Hat OpenShift Container Platform, the majority of vulnerable components are not externally accessible. This means an attacker must already have access to a container within your environment to exploit this vulnerability. However, the ose-hyperkube (openshift-enterprise-hyperkube) container is externally accessible, so there are less barriers to exploitation. Fixes for this specific container are already available.\n\nWithin Red Hat Ansible Automation Platform, the impacted component is Receptor. The impact has been reduced to Low as the vulnerable code is present, but not utilized. There are three potential exposures within this component:\n* Receptor utilizes QUIC a UDP based protocol which does not run over HTTP/2\n* Receptor utilizes the x/net/ipv4 and ipv6 packages, both of which are not affected", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45288" }, { "category": "external", "summary": "RHBZ#2268273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288" }, { "category": "external", "summary": "https://nowotarski.info/http2-continuation-flood/", "url": "https://nowotarski.info/http2-continuation-flood/" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-2687", "url": "https://pkg.go.dev/vuln/GO-2024-2687" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/421644", "url": "https://www.kb.cert.org/vuls/id/421644" } ], "release_date": "2024-04-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "In some environments where http/2 support is not required, it may be possible to disable this feature to reduce risk.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS" }, { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" }, { "cve": "CVE-2023-48631", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "discovery_date": "2023-12-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254559" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in Adobe\u0027s css-tools when parsing CSS. This issue occurs due to improper input validation and may allow an attacker to use a carefully crafted input string to cause a denial of service, especially when attempting to parse CSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "css-tools: regular expression denial of service (ReDoS) when parsing CSS", "title": "Vulnerability summary" }, { "category": "other", "text": "The Regular Expression Denial of Service (ReDoS) vulnerability in css-tools, triggered by improper input validation when parsing CSS, is considered of moderate severity. While it can lead to a denial of service by causing the application to become unresponsive, the impact is limited to scenarios where an attacker can provide crafted input. Additionally, the absence of evidence of active exploitation in the wild and contextual factors, such as the software\u0027s usage, contribute to the moderate severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-48631" }, { "category": "external", "summary": "RHBZ#2254559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-48631", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631" }, { "category": "external", "summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2", "url": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2" } ], "release_date": "2023-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "css-tools: regular expression denial of service (ReDoS) when parsing CSS" }, { "cve": "CVE-2024-24786", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-03-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2268046" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-24786" }, { "category": "external", "summary": "RHBZ#2268046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786" }, { "category": "external", "summary": "https://go.dev/cl/569356", "url": "https://go.dev/cl/569356" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/", "url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-2611", "url": "https://pkg.go.dev/vuln/GO-2024-2611" } ], "release_date": "2024-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-03-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2269576" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the follow-redirects package. While processing the cross-domain redirection, `follow-redirects` clears authorization headers, however, it misses clearing proxy-authentication headers, which contain credentials as well. This issue may lead to credential leaking, having a high impact on data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Possible credential leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28849" }, { "category": "external", "summary": "RHBZ#2269576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849" }, { "category": "external", "summary": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp", "url": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Possible credential leak" }, { "cve": "CVE-2024-29180", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270863" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webpack-dev-middleware package, where it failed to validate the supplied URL address sufficiently before returning local files. This flaw allows an attacker to craft URLs to return arbitrary local files from the developer\u0027s machine. The lack of normalization before calling the middleware also allows the attacker to perform path traversal attacks on the target environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "webpack-dev-middleware: lack of URL validation may lead to file leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in webpack-dev represents a important security issue due to its potential to expose sensitive files and compromise developer machines. By failing to validate URLs and normalize paths effectively, the middleware allows attackers to craft malicious requests that can retrieve arbitrary local files or perform unauthorized path traversal. This could lead to unauthorized access to confidential information, including source code, configuration files, and even system-level files. Given the widespread use of webpack-dev-middleware in web development environments, addressing this vulnerability promptly is important to prevent serious data breaches and protect the integrity of development processes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "known_not_affected": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29180" }, { "category": "external", "summary": "RHBZ#2270863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180" }, { "category": "external", "summary": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6", "url": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6" } ], "release_date": "2024-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:39:32+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-MTA-7.0:mta/mta-rhel8-operator@sha256:1719cafe5b15c44bb1bb207bce1cc2a6ee7c1b097901d8fab61912ce298f40dd_amd64", "9Base-MTA-7.0:mta/mta-analyzer-addon-rhel9@sha256:0c0381b7e457651468411ac42db0cd87070bc711321b51db4d73da7443d9873b_amd64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:a09bcb0103144127baaea5831a75313a5148c1cacca2ca52fdfd93b09986d1fc_arm64", "9Base-MTA-7.0:mta/mta-analyzer-lsp-rhel9@sha256:eeb59395e040f7b5367b5c0e4911e5ee23289cf13a42c517dfe30ec385ddeede_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:1f68cef1b46537edbb48d0842761258c8e8f9456cf2e5f93317e17307646c51d_amd64", "9Base-MTA-7.0:mta/mta-cli-rhel9@sha256:7f9db3bb4df9fa6680c58547974f2c5f1035ba9e65f51acdaea12c082fc78c99_arm64", "9Base-MTA-7.0:mta/mta-hub-rhel9@sha256:9e8489a7a70be8a4035de9921bd7360dd993dfc364fca97abcd7ef5f637bae07_amd64", "9Base-MTA-7.0:mta/mta-operator-bundle@sha256:9eeb43af2bcab84f5261d1575f7c897903a7696dba011d256abffa1fe850eba2_amd64", "9Base-MTA-7.0:mta/mta-ui-rhel9@sha256:d0a02e3d0067cd6811e00a55b644dd9a345261e3f77ed72431a3ce03137d11bf_amd64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:0ee12e416243c3d96ff86d96d203925259f2408633b28db485ff7a0378b7b092_arm64", "9Base-MTA-7.0:mta/mta-windup-shim-rhel9@sha256:122ddc6b9f403fe1dddcd25ee4376cbfb33264019e3199418d879634500389dc_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webpack-dev-middleware: lack of URL validation may lead to file leak" } ] }
rhsa-2024_5314
Vulnerability from csaf_redhat
Published
2024-08-13 15:13
Modified
2024-12-17 22:49
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.13.10 Images security update
Notes
Topic
Red Hat OpenShift Virtualization release 4.13.10 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 4.13.10 images.
Security Fix(es):
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.13.10 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.10 images.\n\nSecurity Fix(es):\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5314", "url": "https://access.redhat.com/errata/RHSA-2024:5314" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "CNV-38482", "url": "https://issues.redhat.com/browse/CNV-38482" }, { "category": "external", "summary": "CNV-41951", "url": "https://issues.redhat.com/browse/CNV-41951" }, { "category": "external", "summary": "CNV-45277", "url": "https://issues.redhat.com/browse/CNV-45277" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5314.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.10 Images security update", "tracking": { "current_release_date": "2024-12-17T22:49:11+00:00", "generator": { "date": "2024-12-17T22:49:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:5314", "initial_release_date": "2024-08-13T15:13:35+00:00", "revision_history": [ { "date": "2024-08-13T15:13:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-13T15:13:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:49:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.13 for RHEL 9", "product": { "name": "CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.10-8" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.10.rhel9-324" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.10-7" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.10-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.10-387" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.10-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.10-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.10-6" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.10-8" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.10.rhel9-324" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.10-7" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.10-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.10-387" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.10-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.10-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.10-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.10-12" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.10-6" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.10-6" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64", "relates_to_product_reference": "9Base-CNV-4.13" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64" ], "known_not_affected": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-13T15:13:35+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5314" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:0a4a376ff222bed50e22b8c6bbb19955f40f5e88173afb81f3e112b4765dc85f_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:47fbeacd6f703081e17c0eefee625547327dde0854ac4e0480b4ca8f240b526f_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:17f37cd7c6d6c934e3518c9564b108cca206fbb807fba811e7d9d80bdd6759b0_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:e6297f16f14b2e3b132d978cad18ca874fbf222dfa2f99083111567d7abe8511_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:867c5f6587b16dd518c38f29cee59ac9e397739a4696b0abedb14c1c11f013b2_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:a526f4badf53c0153236a3d2bdf4da1d9dc90f170e474afcb90a365c9cc8a1fb_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:c6f48f9f7eaa004f191ac2082bd714d32ba54b0647955096dac4148c7ada81a7_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:ed85e0ff0d879079f00ac4db8ef6bb6442a0c203892747cb0cf16e4829102f36_arm64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:c5d3a50d4e3e303a21543f60aaadc518b163bdc11ce966ffefa90ed03b93d8df_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:fc767db1f924404f58d3f53786b06aec5c64ba2a9210a172f649930bc386df6e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:68fb3046f530fe9b56176e8859d05ea730532c5bfca6f9c2f75daf62e72e8303_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:d381b3acd1c20e8e9add194266645677659292ce83a6f73f5912f60741b4e13a_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:706c5f30be8be9362df2e2f96f1d5924dcf4c91a406fbad783cd8c51a7e4733e_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:b8db87159c14e4e11c53df4a1b9ecfa1dfac211a06ca1f8338f55aa765c1b4b1_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:5dbd2dc3ccd0b252cbb8a1b09fa3cb0ceda1795001f9d2912ba6aba74a7db3b9_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ecfb66e2731c27b564a6a5700a70410a029b078505089320126b405fe1da57bb_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:512d79c4f3f12d0a613c152a2a4d2b97abaffebaeb4b43f7bded5cc81ff6f42d_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:7dbbd018f0f380eca54035fef8b528893bcf0fcb7bff21fc7b69a0311ed25c0e_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:1035446fa52630a6bdf80fe3ef00d9a9bd854ea03f69cb40e66a2513346b337d_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:7be61a84776a9c45fe6e1e023befe9dffaa9f9a6ab321eae907261b69e52e704_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:436d340bf1aaf6ea8d61224d4c4efdd81170fc9621777b63567ccb4f43514f2b_arm64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:bad56e671cf0e8989ebdb03990e8bdf8cfd0a9c5d8ad59b345a2e4054af9872c_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:6ed0f7a37463bf4b04ff1aa1179ba15a162e89632e95fd7c9568e66b0713c097_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:9b6778c58ca9eca586c22d37089bca6e300efdc136a67062b9229583974cffe4_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:22129b7ccb8d2a61c1e88904163f5788a2c8d4b1f7e7f113db84ded01110099b_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:7ec58c7b5e472562812bbfbc670c8125d3df564407c98e09520f919b47944148_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:09f10484a4ccf604bbb7b227574a06a2d1ef8867ac0f738d86e7fa396592ad8a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2d26d1e33adc1fbb36b92583c985fc2a5e6baacba638b0b0387ac227dfbe2ed6_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:da4172696f5ba0f1ce25a1a9937db7eaa8d40711d4378ff30349869f92800626_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:ff78eec1b401b2774876de8e2b81041bf72efed4a0040e55e0a1dd0a0f208e7e_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:25b49253816e01102a0f65c121b99c6d08115dfc0bc1269b2546dd92340673b2_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:9a4c8a3a9ee70f1338b16995a534a14d54a49b50fc2bf3f80bc2e80139a94c72_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:15dd4f0ae6c615a1951c2933b99d569ec4ee199a80891f22540e24ba88b832f6_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:5403cff627420f3e28ed16d8e649cfbe6f2cfd6035273a2d45c64eaa92df37c5_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2082fd415e9bd92db19b18c94494e7686900a732309bdbf56197d31f80931cdb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:c2cd9e91fd4111230399577b39157018d0e78307b0a19d25c9f993047618533e_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:703e2d48b0f05dcb269fc783c2c943a1a277e6a4c6a5765f5e938e48b3107f3f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:af64ce4736563ed586e58ddd8688867bc7c7cfea94cd73650fe285a5d799739e_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:2c5847c946575c04557f0043ae1f795bb5ca468a58f43680477d426d6a6e4b51_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:fca498721aeb2f56d9ea0f42b7ff4a1455bfa73fd117300ecdae0d28306a3a76_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:140a87e54fe84e8865dec46021b6a3c2947636579d5c1dd3a026db185e4ca69c_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:4ff16f5cfcbc3fb88282df902537fdb8e7f55f62640f48573d116510f3667e41_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:22fd674c44963592323e99f302a6705dc70a163622f5ebd6ce7e1425ea950426_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:ff4d0d76f25c784321c2fc3a92121491b5901660df1d6b18fd2218ecc46298ce_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:717a4ebf8eac68dc9f4d084f48cb440b80a63074e00c7b6e9129fb6a094a1c18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:c0cfbbe8e2fbb7355fe1db9a470b9be3dcdb9dcfab5e65fbf8775a5c342826d2_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:44146a9ca9c14e9957f39d9d79cada0d0a488ccbabfc4c99ecaa86ef21f3131a_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:618bfc6f0b27e10a385d500dfac8de0cdee74a52e927988f6705420235b09b3a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:1177f8a6962005579158bbf680f9e339945eced80a42215f28165fb1000cef67_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:5e20f7ce0de305318a75e9f393fb343153f94f5bd9ce13064625659e44bb3dd1_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:7aa3ea00849a63c66bd6c830ba1d9939bbbcfb52860e747b20a07bfd5a6361da_arm64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:960c6e2f5e66c343e308428fc8a0cf9c416367c76e7e7f5e1908038f5de60d2f_amd64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:e7570c4a422026af8a5d3450d42e3284f68ebd2a3b3f4fd17d34528a808fa600_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:fdc817dea9d04e06540231828afa79a2c682719ba44f440a320244068add03c3_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:14179da892ba43557f3ac38ed3f7928dc1670b349a7d5e360948afad39fbc7e9_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:200c9a8814f73f3a938e84a56cb766b8d96abab0f99ae75a3347d7ef5ea4b9de_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:89528403a221edea88cafdd6681acb1508e97c5cfc2edd49c3c62f605ad4c50a_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:b38a331aae94a6637295970eb4adb856397cc9513a562c37ae0281d660c22802_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:cf7f889844fd573d0df7176fed845ca14753eab82497d1e54b107be7c66d831e_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:d7ac8f7d5b86f44f33af4b8f02676793d2be008b5e4872041d7497f11653f996_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:5aaba23258242c87b6537e3c5db32e42fac4b23bead9fe137f5813bdd681c4db_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:d487de62283c6d5dda0aecc32eb7d8b8e7be97db66c3b377642225090826f441_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:02b0c45ad75bd7e2e87d5ece32c3fd98037a17901b3c2a14fe02ac7b79289918_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:0bea72b36d82a21eef6dd8bb717d2a9be1754c7b690a52fd4258b9505d9fc55d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:6242870ac677cd81245ecf58a9a04e0bd5134e4ab00d56a3b8076cb6a1b86312_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:fa3f9b66dd1310c30565fe254d06cb4e5b52986dd4e51f9ca42fa8a8b7f7cd8a_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:efa5b7d82e23db505cfa43b1295d9fc20d178e74d19ff631e7d313472dee7b43_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f870d36731cbfcfe3fb8d3d6e4011180d4c927159177d1b9903371c522868d8b_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:929c8c45a3b9b4029906689e6d47938760080a5a1a9c9c2eb9190a198159eefb_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:fba4dc815b69e385522a333faed53ace575d805ddaf0afbed78f15155b284184_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:bfd8b385be10564bf6a4ca650bdd116278f77f734d755e6695c13142445be5ed_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:ef6bebbeb328b5205e1c303e0793bb5a77ee599d779e96c43f4390439138189b_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:1f7121396fc25cba0cf938f6f8726f8c2d124a34f9a50d70020aab2c8504b710_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:7d3858832f4a32e014cea0b590e1cad8514fc1020d79ea960fca524653a560d1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:26a78321a74f27a1b85e37cf58cf7baa4c4cd53a1858ae6e57442cd0bab2725a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:5ff40d2608f731f3718c2d390cf640e73e4ae5deb72fab7b637f6c73ac5a5841_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:17b70495ea71ab3ebc149595d72e3512b257f499e5544fe309e503e48aa4466b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:91a415042b179d9570f15f520087387ce508ab5c6dc487c684888913cc7bd8b3_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ca5605391aa958663f25844d0babf6938dd70f3b5d48547b01161ad618765881_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:ce3e581e895c65fac83003979acdb5340088a8310f782170d2953e7eed512bb4_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5d6a37d561ce1f576b6b30979ae301c37b28f2d5290a2fb3f67aeefbaaaed34b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:6f67e5c7939a95c845f75c103287dcea82a754e9f8d27fc76eca6f0c4a69361d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:5e069b798e469eec1d6ad3d1840d15652d5386707ac6518b3adfaa49960188b7_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:97b713c305730d9f10b23741c4d510b20f1d3c210cadc54bb20f00cd76fde37c_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5f30fc1baa633c9dad548e8bccaaa34cb3450ed818f34ae7d21043ac6ec60cf7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:c691ecf79727859ce828381bf023ab49fe74a2443f1039be0580cc4ce0a2702b_amd64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:1abae677c8b1f2c773962d9fd37aeb84e3a45b12e99a3e9a79715881820ef454_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:74a688af8fb2d3395b2067a1d9e89c5cc4674b73834810257fef3186a7e1d428_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:a29dbeaebe0d993994f0ec247ae08aa8c61b8512b69a439a7b326eb29353a681_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:ee81fb5f510b8e99f36eaa02323ce5b004f7377b2eddfd5f3eb7cbc4682ee2b8_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ba3cef24c0335fc51da207f6528b766b35f86518f2d4ecfab93ac8e321a6cba4_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:ce3b788961434d7b796e1094e430ffdc0a887941a1dfbf1b0d4570d804abc75e_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" } ] }
rhsa-2024_3314
Vulnerability from csaf_redhat
Published
2024-05-23 06:29
Modified
2024-12-17 22:43
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.15.2 Images security update
Notes
Topic
Red Hat OpenShift Virtualization release 4.15.2 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 4.15.2 images.
Security Fix(es):
* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.15.2 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.15.2 images.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)\n\n* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3314", "url": "https://access.redhat.com/errata/RHSA-2024:3314" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "2256413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413" }, { "category": "external", "summary": "2268273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273" }, { "category": "external", "summary": "CNV-34292", "url": "https://issues.redhat.com/browse/CNV-34292" }, { "category": "external", "summary": "CNV-34963", "url": "https://issues.redhat.com/browse/CNV-34963" }, { "category": "external", "summary": "CNV-37007", "url": "https://issues.redhat.com/browse/CNV-37007" }, { "category": "external", "summary": "CNV-37018", "url": "https://issues.redhat.com/browse/CNV-37018" }, { "category": "external", "summary": "CNV-38360", "url": "https://issues.redhat.com/browse/CNV-38360" }, { "category": "external", "summary": "CNV-38599", "url": "https://issues.redhat.com/browse/CNV-38599" }, { "category": "external", "summary": "CNV-38661", "url": "https://issues.redhat.com/browse/CNV-38661" }, { "category": "external", "summary": "CNV-38699", "url": "https://issues.redhat.com/browse/CNV-38699" }, { "category": "external", "summary": "CNV-38845", "url": "https://issues.redhat.com/browse/CNV-38845" }, { "category": "external", "summary": "CNV-39100", "url": "https://issues.redhat.com/browse/CNV-39100" }, { "category": "external", "summary": "CNV-39557", "url": "https://issues.redhat.com/browse/CNV-39557" }, { "category": "external", "summary": "CNV-39686", "url": "https://issues.redhat.com/browse/CNV-39686" }, { "category": "external", "summary": "CNV-39704", "url": "https://issues.redhat.com/browse/CNV-39704" }, { "category": "external", "summary": "CNV-40159", "url": "https://issues.redhat.com/browse/CNV-40159" }, { "category": "external", "summary": "CNV-40904", "url": "https://issues.redhat.com/browse/CNV-40904" }, { "category": "external", "summary": "CNV-41508", "url": "https://issues.redhat.com/browse/CNV-41508" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3314.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.15.2 Images security update", "tracking": { "current_release_date": "2024-12-17T22:43:36+00:00", "generator": { "date": "2024-12-17T22:43:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:3314", "initial_release_date": "2024-05-23T06:29:37+00:00", "revision_history": [ { "date": "2024-05-23T06:29:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-05-23T06:29:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:43:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.15 for RHEL 9", "product": { "name": "CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.15::el9" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "product": { "name": "container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "product_id": "container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "product_identification_helper": { "purl": "pkg:oci/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-controller-rhel9\u0026tag=v4.15.2-17" } } }, { "category": "product_version", "name": "container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "product": { "name": "container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "product_id": "container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "product_identification_helper": { "purl": "pkg:oci/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-operator-rhel9\u0026tag=v4.15.2-17" } } }, { "category": "product_version", "name": "container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "product": { "name": "container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "product_id": "container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "product_identification_helper": { "purl": "pkg:oci/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-server-rhel9\u0026tag=v4.15.2-17" } } }, { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.15.2-11" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.15.2.rhel9-335" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.15.2-11" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.15.2-11" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "product": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "product_id": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-apiserver-proxy-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "product": { "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "product_id": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-common-instancetypes-rhel9\u0026tag=v4.15.2-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.15.2-383" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "product": { "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "product_id": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-realtime-checkup-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "product": { "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "product_id": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-storage-checkup-rhel9\u0026tag=v4.15.2-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.15.2-6" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "product": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "product_id": "container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-controller-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "product": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "product_id": "container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-lock-server-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "product": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "product_id": "container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-operator-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "product": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "product_id": "container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "product_identification_helper": { "purl": "pkg:oci/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/pr-helper-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.15.2-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.15.2-13" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.15.2-2" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "product": { "name": "container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "product_id": "container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "product_identification_helper": { "purl": "pkg:oci/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-controller-rhel9\u0026tag=v4.15.2-17" } } }, { "category": "product_version", "name": "container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "product": { "name": "container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "product_id": "container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "product_identification_helper": { "purl": "pkg:oci/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-operator-rhel9\u0026tag=v4.15.2-17" } } }, { "category": "product_version", "name": "container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "product": { "name": "container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "product_id": "container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "product_identification_helper": { "purl": "pkg:oci/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-server-rhel9\u0026tag=v4.15.2-17" } } }, { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.15.2-11" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.15.2.rhel9-335" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.15.2-11" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.15.2-11" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "product": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "product_id": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-apiserver-proxy-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "product": { "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "product_id": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-common-instancetypes-rhel9\u0026tag=v4.15.2-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.15.2-383" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "product": { "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "product_id": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-realtime-checkup-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "product": { "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "product_id": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-storage-checkup-rhel9\u0026tag=v4.15.2-5" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.15.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.15.2-6" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "product": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "product_id": "container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-controller-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "product": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "product_id": "container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-lock-server-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "product": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "product_id": "container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-operator-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "product": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "product_id": "container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "product_identification_helper": { "purl": "pkg:oci/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/pr-helper-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.15.2-12" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.15.2-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.15.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.15.2-9" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.15.2-13" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.15.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.15.2-2" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64" }, "product_reference": "container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64" }, "product_reference": "container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64" }, "product_reference": "container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64" }, "product_reference": "container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64" }, "product_reference": "container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64" }, "product_reference": "container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64" }, "product_reference": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64" }, "product_reference": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64" }, "product_reference": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64" }, "product_reference": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64" }, "product_reference": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64" }, "product_reference": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64" }, "product_reference": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64" }, "product_reference": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64" }, "product_reference": "container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64" }, "product_reference": "container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64" }, "product_reference": "container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64" }, "product_reference": "container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64" }, "product_reference": "container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64" }, "product_reference": "container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64" }, "product_reference": "container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64" }, "product_reference": "container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "relates_to_product_reference": "9Base-CNV-4.15" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64 as a component of CNV 4.15 for RHEL 9", "product_id": "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64", "relates_to_product_reference": "9Base-CNV-4.15" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-26159", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256413" } ], "notes": [ { "category": "description", "text": "An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()", "title": "Vulnerability summary" }, { "category": "other", "text": "follow-redirects is a transitive dependency of Grafana, and does not affect Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64" ], "known_not_affected": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26159" }, { "category": "external", "summary": "RHBZ#2256413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26159", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159" } ], "release_date": "2024-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:29:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3314" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()" }, { "acknowledgments": [ { "names": [ "Bartek Nowotarski" ], "organization": "nowotarski.info" } ], "cve": "CVE-2023-45288", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2268273" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered with the implementation of the HTTP/2 protocol in the Go programming language. There were insufficient limitations on the amount of CONTINUATION frames sent within a single stream. An attacker could potentially exploit this to cause a Denial of Service (DoS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates the security impact of this vulnerability as Important due to the worst case scenario resulting in a denial of service. It is simple to exploit, could significantly impact availability, and there is not a suitable mitigation for all use cases. Once an attack has ended, the system should return to normal operations on its own.\n\nThis vulnerability only impacts servers which have HTTP/2 enabled. It stems from an imperfect definition of the protocol. As the Go programming language is widely utilized across nearly every major Red Hat offering, a full listing of impacted packages will not be provided. Therefore, the \u201cAffected Packages and Issued Red Hat Security Errata\u201d section contains a simplified list of what offerings need to remediate this vulnerability. Every impacted offering has at least one representative component listed, but potentially not all of them. Rest assured that Red Hat is committed to remediating this vulnerability across our entire portfolio.\n\nMany components are rated as Low impact due to configurations which reduce the attack surface or significantly increase the difficulty of exploitation. A summary of these scenarios are:\n* The container includes a package that provides a vulnerable webserver, but it is not used or running during operation\n* HTTP/2 is disabled by default and is not supported\n* Only a client implementation is provided, which is not vulnerable\n* A vulnerable module (either golang.org/net/http or golang.org/x/net/http2) is included, but disabled\n* Access to a vulnerable server is restricted within the container (loopback only connections)\n* Golang is available in the container but is not used\n\n\nWithin the Red Hat OpenShift Container Platform, the majority of vulnerable components are not externally accessible. This means an attacker must already have access to a container within your environment to exploit this vulnerability. However, the ose-hyperkube (openshift-enterprise-hyperkube) container is externally accessible, so there are less barriers to exploitation. Fixes for this specific container are already available.\n\nWithin Red Hat Ansible Automation Platform, the impacted component is Receptor. The impact has been reduced to Low as the vulnerable code is present, but not utilized. There are three potential exposures within this component:\n* Receptor utilizes QUIC a UDP based protocol which does not run over HTTP/2\n* Receptor utilizes the x/net/ipv4 and ipv6 packages, both of which are not affected", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45288" }, { "category": "external", "summary": "RHBZ#2268273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45288" }, { "category": "external", "summary": "https://nowotarski.info/http2-continuation-flood/", "url": "https://nowotarski.info/http2-continuation-flood/" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-2687", "url": "https://pkg.go.dev/vuln/GO-2024-2687" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/421644", "url": "https://www.kb.cert.org/vuls/id/421644" } ], "release_date": "2024-04-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:29:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3314" }, { "category": "workaround", "details": "In some environments where http/2 support is not required, it may be possible to disable this feature to reduce risk.", "product_ids": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS" }, { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64" ], "known_not_affected": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-23T06:29:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3314" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:05c354f5775ffe9eb40a70723af9710589315126049c2b0613729a7601fea711_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-controller-rhel9@sha256:3b5dd9a5217af5db0347efafb380e91da1a1176e2b40f356115e870612b79928_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:15079d40fa0e418fec82620b3f52e394743c9d7f0433f2b8aac3484fbb57b790_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-operator-rhel9@sha256:2519a913edf163445c0819c465f3323b9d82e10bfd34129b79f83f5e395a41b9_amd64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:146b827825bb5222ad360f8672d4ef34989518b43369b641fc703eb704c891a6_arm64", "9Base-CNV-4.15:container-native-virtualization/aaq-server-rhel9@sha256:96de7d4fd401026664eaff799585823a5906b7e72ed24c685648086f1e1c02e4_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:09b473b05aa69cbc131c52ceea7885dd6a7367ccb80f6d3832da9df4e61cee1c_amd64", "9Base-CNV-4.15:container-native-virtualization/bridge-marker-rhel9@sha256:35ac9c93a2b6571ca28ca1e13e040d7a06113ec9a768c02e8c0735f76c6c0b69_arm64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:690a5b5450c77fbc2c9928ff7849c447a6ec015f4dcd481060c49250a5509358_amd64", "9Base-CNV-4.15:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:bf42cd420929b12d78ebd7567b4de1c32ea343f0201ae7ecfb9d3a47b12220c1_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:389e56fa3345ea9866b9c7789ff9ad04d3ff2b45db91eb13b20287960c6fe72a_arm64", "9Base-CNV-4.15:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:abf9f568d866433b9c1a4f08b63ca6f11543171882694179b37b70feb75257de_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:207cf6cbaf6a79f15146c8d6dba36979303e07f9793ace901b97e330f167ecc2_amd64", "9Base-CNV-4.15:container-native-virtualization/cnv-must-gather-rhel9@sha256:cadf6787d391f64df11112c29d7c8f2b3f9eb312e478d8cdd8e634401d390834_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:26324b49a3da9d17d5f3814b54cdcfc839dbca423800aeba48774a774d79035b_arm64", "9Base-CNV-4.15:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d9f6a92e9f8e1a14b243dd1c28ea3e2c3ad7a45aca410b8f4c24e697a32a57c4_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5c91f322e434d71a762cf13bbf0bbd94dfd12218a1bc263b688388bc1ad57ff1_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:5f5f0b425c59626724f5e09ded54c670ac80b2c7279d49f61d9e40306b07e272_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:0199a42c1b7a987ec91a4e33e7fdbdcc3ac6ce6dd5a1ece9edb03ac067a1b696_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:bd4e4565518629c98f5bfa87e459425f9efcc8312f24e9428556d8593cc91f16_amd64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:366ce321638295540c24a2ad7e05002c2ab23ef793010acd9e248729baf9efd8_arm64", "9Base-CNV-4.15:container-native-virtualization/hostpath-provisioner-rhel9@sha256:cb5d049a9c06d01ccb8548d6111e051263dfdfd99cbd8ecf1215fa0de692e8bf_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:417c74820c9996c9ed5958be73b4e2edfb62d49d8afdcac819f70c9b407df20c_amd64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:bd5a3c794887ee63ac600a0d0298092196a2e642a92cc33bc2cfb3f751811dfc_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:0889491602786dc9ba90e09b2744448be3e36e60a1525020566855bdf950d460_arm64", "9Base-CNV-4.15:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:66fa300a526204e9f4925b5a7d554bcce225935385625e040cee6fe75a44578d_amd64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:17727cf133d3fbf9865bf7f9ae1a09a40fd0d21114a38a046ecffeac26ec2e61_arm64", "9Base-CNV-4.15:container-native-virtualization/kubemacpool-rhel9@sha256:d1296ec61183139682510dde727114e406c6072ae8d4429b983f878c1bad8b21_amd64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:965e1b1afc72a7c96d2f90c673ba07f3856cc646017e222e9d03a9400f72cf1b_arm64", "9Base-CNV-4.15:container-native-virtualization/kubesecondarydns-rhel9@sha256:c18f0a4a085ffbbd0737cada237bb1965242648fb938317cde86d26670785d97_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:68d4683b131e3d8d76af5c17e3a50e36c6ea9d1e9fe4fb32a519f830bcf98eaa_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:c8a7b80129aeb6ec0ce7a5adfb3541c898fc21995500fd5a8bd67cd2192b2578_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:487743c7eb7643d1abe75fd0ac33373eeda5294bc6e6ac152b6af697feab7404_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:d438ddcf84de78b0235e340bc08002e2afb56d8a7f4a0c89f71bbb6564b7982e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:81d5f20abbe9d500a1423091099b5547245d901c917005baeee4c242da8deb01_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:8f0139de40eaf5e289c9b50a6cdc74a834969ded6d66bba9d12440a54fcf1ae4_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:2333869b30618b70ab249232fe0772f022632856b03eb94de2b141f3e254b34e_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:9bf95180f0cd4ebea96e0041df8d1fbfa9854029cfdd744360463bacd2ae444e_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:1ad39919a142b363ee4b21cd3c5cdf0123be6ae04a4ed3dea1d51ae9cf981926_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:3ec79a119c0377f8940bea61d5acef2a142d79eb6e8c253d805192dcd48feb08_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:92ede880b1530338a189dee89a02a4bfce97f867d25673180b1be0e246407ccd_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:c82dda7fe3abade25b973f5245273c4b69bec67cd5bfcf1181d36090b3e1e49f_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:63601a0199cec20ef3ce7c7194fd3a6c8ffb3bbd43cb2401ccb7c6b8b1cd8016_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:f6fd5454eef6a922f36780ce684a2927916fe709329ed34c1345087cbf368f71_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:4f335f3874ee1394b7167b0b2bcf20a1f4b735f3189427e35632e46153123fff_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:a49c9abe0d3f9fb625884ebd8325d29fae4339cfe5665955ab19e6a402d584ab_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:4b3aa1b4eedc72c3e0ee24ba01ecbe319434e597d452dececab171a32150cd13_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:7291554489004db05824fe6087480c86e7d2307dce8e4a66fe23bd6df4734406_amd64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:7221d0f9ec2bb8fe10d6fa7557358f6809870ceca6abffff76fbaa9ffb89bfa9_arm64", "9Base-CNV-4.15:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:dd5b0921375532de1914ad99af9bf297004744e34a65c59223ca6cb82667d95c_amd64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:4496c4b20546d54711c3135758c7f77639312386e8ed489a2436f2fcd9f7f9e1_arm64", "9Base-CNV-4.15:container-native-virtualization/libguestfs-tools-rhel9@sha256:de720a20dda05a48de4e72582b0914d3b5ee5cad5a637efdac38dbb0654b991d_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:34beadf8d8f247bb563d5e6611bec5663612d8dd7049466744241b4e4074f66e_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-controller-rhel9@sha256:a11b3863959467dea87a535f15a5b775017942b953e6b0387e44e152b2fbb3ff_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:2305a1d942e1a99063f9ff2d5a1e2f0328734d29ae447201afa190016024832c_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-lock-server-rhel9@sha256:c5bb6711b4abbcef730be51ee67b59834acadaf93599d2db8cfedc7640b24946_arm64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:2fcaceb5089f65dbddd9acdd8484cc41198a4138b8376d49db14b680da8330e9_amd64", "9Base-CNV-4.15:container-native-virtualization/mtq-operator-rhel9@sha256:9311bd6eb75421e49399647a21c79348702229ce1eb0c040674bfedad55fcdf6_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:8699359b01ca935c95c5e4c91e082243f3b0fd388b76041ad28ebb501c86cc9a_arm64", "9Base-CNV-4.15:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:aeda2c344f1fb0706a04495ceb7c5f5fc0bca7b2b3daa949847cf5f98d175e68_amd64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:49fcce3d3cb9f1b14baba4aa73e31634aabab0fca0d44e1e494912504b625268_arm64", "9Base-CNV-4.15:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:9eb2dfb42ad50e6fe431a8518304712da3a35d21a0d2e609b281c6b45f3fbc76_amd64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:65ab2009e6c4b6a69374d0654f97e77085b0b063df6dfb4cfa671d1dc54fa4de_arm64", "9Base-CNV-4.15:container-native-virtualization/pr-helper-rhel9@sha256:c122c6bc64b926709fa42f9c37579b4cd412a4c032ddfab1e89edd5610ad6700_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:0389262d2278d0019efce4612932a32af3a6423c2d7245e5495f466729157170_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-api-rhel9@sha256:fe4a9a2f847641ecae2ba87615db0bf06323ed905d76b0686ab7631979ac0fca_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:109296d7e17bb3bcd2050ef351f05ec2010075ac2110c232ba06210553b220d8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-artifacts-server-rhel9@sha256:2188b4a2a663351d4f9d6bd44db28494bac48563b762f26a50ab578c414ed3e3_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:2ce2be45cb027387848f9a57c4eb039825a923c3d94257e9c6ddcf9fd9909e74_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:3e8423020cd7e4b9ed5731a9821392dcf95e2c1004cc60ec81adf1dcef869b8b_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:640102a1dfbb95c84258790f0a3508f42b994e24a2f3d3ff50eae13322f9eca6_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:92967ffa5e4797dbd405d996a683bc5bb7119dea648699cb9e2b00accae81836_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:8deb061a2f2677aeed034d5e08d70fb9d56a9ea5d257f0bd3ff29c1b86c3c1bf_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-controller-rhel9@sha256:a9f98265d1898998206ff81490d53dad15fe32368cb24d3d270f6bb6588269bf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:b2d34043c76548fe63a6efc4417708951942ea2f6533d73b1c52a261bb1f1377_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-importer-rhel9@sha256:f75d71f94736353d3e1c4d01ab20c7dfb94e7c11c42fd8396393b96d6e3f5fa9_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:422ad4ca96e2b12f89e04cea0b1bcaad7fd4e092993a0f24ca2b2c70ea2ad7cc_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-operator-rhel9@sha256:8ce7a3578d42e6bdf1aded6a6b38d2401cf023093803bae705b360fb5adc9bbb_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:b09e57dee56aa1a6b094d01931e2d54203a69940f2fad777e04975dfa93cdd73_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:c1537f4dd62ec6297b07a4a47642e8e1823f2eb764202e221c4849f684d6f351_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:85bb7bb57e9ca1b23c204801fc8f2a0c9276e7e1f1456ffb2e616b1cb6ab2005_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:8aca3b0011d9ee1f5983ae732de79968c2e4a48ed0720343490db30f92797b05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:9a5e836b5a33b15b98923cff7e8cc6a258a244f123076f56ee571c96e43576cf_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-controller-rhel9@sha256:be63e57b256ef2a41f7053acf24265b254d96f293fcc7d20c0be4176060e91f8_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:279bf530bae7e042dff88305f24ad7805ced02dcc960adfe61708f87ff61441f_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-exportproxy-rhel9@sha256:df751abcc53676137ddda43e1ea38c7f938cbfcbb08df5027cc93780961194b0_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:e5494ab1eb24c2b83e1b5caaef208e618b8f44bbaaa9102fab00c64520fb69c9_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-exportserver-rhel9@sha256:f288029a586318d209d991fa654d42d52214c3c6dc1d41539e70eae7c0130dc1_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:a8f9ce5eb47454dc8085ac590487bbefa0904371b0325cfb06c9b93c0178bdae_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-handler-rhel9@sha256:cd4804ff3dfb0b64981ca3bda3f160c61cdce5722c40283cfa248e039d23253b_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:0c0ed8df6ce1774cec46b0865fc43d6a0cd61c3ba1024379cd2041a5d1f54211_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-launcher-rhel9@sha256:b1176298e989626d64f329ecc7617a66ce3d8478354e5e7aff3a3fb8b1fc5e05_amd64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:2a26bf18f86baf131580c5fa227600f8152401aa231dcc7736a75ca834d184ae_arm64", "9Base-CNV-4.15:container-native-virtualization/virt-operator-rhel9@sha256:5d04ca926ad1f29760f15d294c7d433217601508b98646d1f9fd4ccc8ffcdfe7_amd64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:9057d1d7f9d74cd11a833c53bb1bb11d0fd5ea8a9a613044324fe319e87de41d_arm64", "9Base-CNV-4.15:container-native-virtualization/virtio-win-rhel9@sha256:f32ca0dab69d238341ad822fe84333390efb832025d3a18d2e88895dc7309302_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:100e1d5216b5ca9343eb58e61cfc77c069bf0e137a3ec67da519c4ed6d272b5d_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-console-proxy-rhel9@sha256:39084d00f6f68ca7137a4a4b13de958b3aa04d10e69f52c498b3f0bcb4f30bf8_arm64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:6f102d120c5059b43480273e9d223c8307c7ab2bb8887573b9b498863f2149d2_amd64", "9Base-CNV-4.15:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:9060a82f10acda7b5ca8b895cb4ba608ad00b4bb9fccbceaab0c4128d9790c1a_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" } ] }
rhsa-2024_1925
Vulnerability from csaf_redhat
Published
2024-04-18 12:41
Modified
2024-12-17 22:39
Summary
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.3 security and bug fix update
Notes
Topic
The Migration Toolkit for Containers (MTC) 1.8.3 is now available.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security Fix(es) from Bugzilla:
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Migration Toolkit for Containers (MTC) 1.8.3 is now available.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\n* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1925", "url": "https://access.redhat.com/errata/RHSA-2024:1925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2242064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242064" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "2267018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267018" }, { "category": "external", "summary": "2268046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1925.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.3 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:39:24+00:00", "generator": { "date": "2024-12-17T22:39:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:1925", "initial_release_date": "2024-04-18T12:41:00+00:00", "revision_history": [ { "date": "2024-04-18T12:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-18T12:41:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:39:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-RHMTC-1.8", "product": { "name": "8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.8::el8" } } } ], "category": "product_family", "name": "Red Hat Migration Toolkit" }, { "branches": [ { "category": "product_version", "name": "rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "product": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.8.3-6" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "product": { "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.8.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "product": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.8.3-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "product": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.8.3-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "product": { "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.8.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "product": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.8.3-6" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "product": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "product_id": "rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.8.3-13" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "product": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.8.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "product": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.8.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64", "product": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64", "product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.8.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8\u0026tag=v1.8.3-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64" }, "product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64" }, "product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64" }, "product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64" }, "product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64" }, "product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64" }, "product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64" }, "product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64" }, "product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64" }, "product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64" }, "product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64 as a component of 8Base-RHMTC-1.8", "product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64", "relates_to_product_reference": "8Base-RHMTC-1.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T12:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1925" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" }, { "cve": "CVE-2024-24786", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-03-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2268046" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-24786" }, { "category": "external", "summary": "RHBZ#2268046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786" }, { "category": "external", "summary": "https://go.dev/cl/569356", "url": "https://go.dev/cl/569356" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/", "url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-2611", "url": "https://pkg.go.dev/vuln/GO-2024-2611" } ], "release_date": "2024-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-18T12:41:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1925" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:f8bb40b67361ce71c049a6c01480b121654e1dbdeb6d4e0de083139799ec896f_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:b23a8caf24c7006abd0b60d30d0274f65c3e246ee9afa4172dbdfcfdb1ab1f56_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:cf04aecf798695488d782ab240539c6c76ded0e392db812d7a1e81194d6713f5_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:41ed4c8a0c1a6730b328eeba4a83fb128a5bffc3549a74375c512d87edf305e2_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:352748648fdb5c8fd3e70c893ece3577e197c98ee668a85273ad0039b652f3f3_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:49b4655b2b31844f4732b8bff1e01b3ca038b6635665caf23cf747790c6074c6_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:cfbf428a046ca3e673fe10fe4df989c8a286e9e7eaa9461eaa2b09d8c9332292_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:5a0ee2242345f67c5c51d1ca75e6d9a1893676bcea84759b4a6a4282d47d0066_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:b0f5036015c0b272e403e706ab40e2cdc3b76072cdb0c5bef0cc1531dc6901fc_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:902ba355ec98d5d07c8994f0a7897ce1403dad657d6c8e3aa9a0d7adcbcec515_amd64", "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:17d30fd60779b7709db3ed321a44f030ff52c2755c56b25fa3931481c7679ee1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON" } ] }
rhsa-2024_3989
Vulnerability from csaf_redhat
Published
2024-06-20 00:34
Modified
2024-12-17 22:45
Summary
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
Notes
Topic
Migration Toolkit for Applications 6.2.3 release
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Migration Toolkit for Applications 6.2.3 Images
Security Fix(es) from Bugzilla:
* keycloak: path transversal in redirection validation (CVE-2024-1132)
* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
* css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)
* css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)
* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)
* io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx (CVE-2024-1023)
* io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support (CVE-2024-1300)
* commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file (CVE-2024-25710)
* commons-compress: OutOfMemoryError unpacking broken Pack200 file (CVE-2024-26308)
* follow-redirects: Possible credential leak (CVE-2024-28849)
* jetty: Improper addition of quotation marks to user inputs in CgiServlet (CVE-2023-36479)
* commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree (CVE-2024-29133)
* commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator() (CVE-2024-29131)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Migration Toolkit for Applications 6.2.3 release\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Migration Toolkit for Applications 6.2.3 Images\n\nSecurity Fix(es) from Bugzilla:\n\n* keycloak: path transversal in redirection validation (CVE-2024-1132)\n\n* webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\n* css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)\n\n* css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)\n\n* follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)\n\n* io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx (CVE-2024-1023)\n\n* io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support (CVE-2024-1300)\n\n* commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file (CVE-2024-25710)\n\n* commons-compress: OutOfMemoryError unpacking broken Pack200 file (CVE-2024-26308)\n\n* follow-redirects: Possible credential leak (CVE-2024-28849)\n\n* jetty: Improper addition of quotation marks to user inputs in CgiServlet (CVE-2023-36479)\n\n* commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree (CVE-2024-29133)\n\n* commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator() (CVE-2024-29131)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3989", "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2239630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239630" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "2250364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250364" }, { "category": "external", "summary": "2254559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559" }, { "category": "external", "summary": "2256413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413" }, { "category": "external", "summary": "2260840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260840" }, { "category": "external", "summary": "2262117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262117" }, { "category": "external", "summary": "2263139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263139" }, { "category": "external", "summary": "2264988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264988" }, { "category": "external", "summary": "2264989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264989" }, { "category": "external", "summary": "2269576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576" }, { "category": "external", "summary": "2270673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270673" }, { "category": "external", "summary": "2270674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270674" }, { "category": "external", "summary": "2270863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3989.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:45:59+00:00", "generator": { "date": "2024-12-17T22:45:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:3989", "initial_release_date": "2024-06-20T00:34:55+00:00", "revision_history": [ { "date": "2024-06-20T00:34:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-06-20T00:34:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:45:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MTA 6.2 for RHEL 8", "product": { "name": "MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_applications:6.2::el9" } } }, { "category": "product_name", "name": "MTA 6.2 for RHEL 8", "product": { "name": "MTA 6.2 for RHEL 8", "product_id": "8Base-MTA-6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:migration_toolkit_applications:6.2::el8" } } } ], "category": "product_family", "name": "Migration Toolkit for Applications" }, { "branches": [ { "category": "product_version", "name": "mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "product": { "name": "mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "product_id": "mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel9\u0026tag=6.2.3-1" } } }, { "category": "product_version", "name": "mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "product": { "name": "mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "product_id": "mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=6.2.3-4" } } }, { "category": "product_version", "name": "mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "product": { "name": "mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "product_id": "mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=6.2.3-1" } } }, { "category": "product_version", "name": "mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "product": { "name": "mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "product_id": "mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-pathfinder-rhel9\u0026tag=6.2.3-1" } } }, { "category": "product_version", "name": "mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "product": { "name": "mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "product_id": "mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel9\u0026tag=6.2.3-2" } } }, { "category": "product_version", "name": "mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64", "product": { "name": "mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64", "product_id": "mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64", "product_identification_helper": { "purl": "pkg:oci/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-addon-rhel9\u0026tag=6.2.3-2" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64" }, "product_reference": "mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "relates_to_product_reference": "8Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64" }, "product_reference": "mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64" }, "product_reference": "mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64" }, "product_reference": "mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" }, "product_reference": "mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "relates_to_product_reference": "9Base-MTA-6.2" }, { "category": "default_component_of", "full_product_name": { "name": "mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64 as a component of MTA 6.2 for RHEL 8", "product_id": "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" }, "product_reference": "mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64", "relates_to_product_reference": "9Base-MTA-6.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-26159", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-01-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256413" } ], "notes": [ { "category": "description", "text": "An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()", "title": "Vulnerability summary" }, { "category": "other", "text": "follow-redirects is a transitive dependency of Grafana, and does not affect Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26159" }, { "category": "external", "summary": "RHBZ#2256413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26159", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159" } ], "release_date": "2024-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()" }, { "cve": "CVE-2023-26364", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-11-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2250364" } ], "notes": [ { "category": "description", "text": "A flaw was found in Adobe CSS Tools. An improper input validation could result in a minor denial of service while parsing a malicious CSS with the parse component. User interaction and privileges are not required to jeopardize an environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "css-tools: Improper Input Validation causes Denial of Service via Regular Expression", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26364" }, { "category": "external", "summary": "RHBZ#2250364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26364", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26364" }, { "category": "external", "summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg", "url": "https://github.com/adobe/css-tools/security/advisories/GHSA-hpx4-r86g-5jrg" } ], "release_date": "2023-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "No mitigation is yet available for this vulnerability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "css-tools: Improper Input Validation causes Denial of Service via Regular Expression" }, { "cve": "CVE-2023-36479", "cwe": { "id": "CWE-149", "name": "Improper Neutralization of Quoting Syntax" }, "discovery_date": "2023-09-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2239630" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty\u0027s CGI servlet which permits incorrect command execution in specific circumstances such as requests with certain characters in requested filenames. This issue could allow an attacker to run permitted commands other than the one requested.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: Improper addition of quotation marks to user inputs in CgiServlet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-36479" }, { "category": "external", "summary": "RHBZ#2239630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239630" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-36479", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-36479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36479" } ], "release_date": "2023-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: Improper addition of quotation marks to user inputs in CgiServlet" }, { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" }, { "cve": "CVE-2023-48631", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "discovery_date": "2023-12-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254559" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in Adobe\u0027s css-tools when parsing CSS. This issue occurs due to improper input validation and may allow an attacker to use a carefully crafted input string to cause a denial of service, especially when attempting to parse CSS.", "title": "Vulnerability description" }, { "category": "summary", "text": "css-tools: regular expression denial of service (ReDoS) when parsing CSS", "title": "Vulnerability summary" }, { "category": "other", "text": "The Regular Expression Denial of Service (ReDoS) vulnerability in css-tools, triggered by improper input validation when parsing CSS, is considered of moderate severity. While it can lead to a denial of service by causing the application to become unresponsive, the impact is limited to scenarios where an attacker can provide crafted input. Additionally, the absence of evidence of active exploitation in the wild and contextual factors, such as the software\u0027s usage, contribute to the moderate severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-48631" }, { "category": "external", "summary": "RHBZ#2254559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-48631", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631" }, { "category": "external", "summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2", "url": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2" } ], "release_date": "2023-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "css-tools: regular expression denial of service (ReDoS) when parsing CSS" }, { "cve": "CVE-2024-1023", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-01-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2260840" } ], "notes": [ { "category": "description", "text": "A vulnerability in the Eclipse Vert.x toolkit results in a memory leak due to using Netty FastThreadLocal data structures. Specifically, when the Vert.x HTTP client establishes connections to different hosts, triggering the memory leak. The leak can be accelerated with intimate runtime knowledge, allowing an attacker to exploit this vulnerability. For instance, a server accepting arbitrary internet addresses could serve as an attack vector by connecting to these addresses, thereby accelerating the memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-1023" }, { "category": "external", "summary": "RHBZ#2260840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1023", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1023" }, { "category": "external", "summary": "https://github.com/eclipse-vertx/vert.x/issues/5078", "url": "https://github.com/eclipse-vertx/vert.x/issues/5078" }, { "category": "external", "summary": "https://github.com/eclipse-vertx/vert.x/pull/5080", "url": "https://github.com/eclipse-vertx/vert.x/pull/5080" }, { "category": "external", "summary": "https://github.com/eclipse-vertx/vert.x/pull/5082", "url": "https://github.com/eclipse-vertx/vert.x/pull/5082" } ], "release_date": "2024-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx" }, { "acknowledgments": [ { "names": [ "Axel Flamcourt" ] } ], "cve": "CVE-2024-1132", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2024-01-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2262117" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field, and requires user interaction within the malicious URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: path transversal in redirection validation", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Build of Quarkus is not impacted as this CVE affects the server-side Keycloak execution, but Quarkus only acts as a Keycloak client in its quarkus-keycloak-authorization extension. For this reason, Quarkus is marked as having a Low impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-1132" }, { "category": "external", "summary": "RHBZ#2262117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1132", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1132" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1132", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1132" } ], "release_date": "2024-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "No current mitigation is available for this vulnerability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: path transversal in redirection validation" }, { "cve": "CVE-2024-1300", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-02-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263139" } ], "notes": [ { "category": "description", "text": "A vulnerability in the Eclipse Vert.x toolkit causes a memory leak in TCP servers configured with TLS and SNI support. When processing an unknown SNI server name assigned the default certificate instead of a mapped certificate, the SSL context is erroneously cached in the server name map, leading to memory exhaustion. This flaw allows attackers to send TLS client hello messages with fake server names, triggering a JVM out-of-memory error.", "title": "Vulnerability description" }, { "category": "summary", "text": "io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support", "title": "Vulnerability summary" }, { "category": "other", "text": "This affects only TLS servers with SNI enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-1300" }, { "category": "external", "summary": "RHBZ#2263139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1300", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1300" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1300", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1300" }, { "category": "external", "summary": "https://vertx.io/docs/vertx-core/java/#_server_name_indication_sni.", "url": "https://vertx.io/docs/vertx-core/java/#_server_name_indication_sni." } ], "release_date": "2024-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-02-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2264988" } ], "notes": [ { "category": "description", "text": "A loop with an unreachable exit condition (Infinite Loop) vulnerability was found in Apache Common Compress. This issue can lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-25710" }, { "category": "external", "summary": "RHBZ#2264988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-25710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-25710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25710" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2024/02/19/1", "url": "http://www.openwall.com/lists/oss-security/2024/02/19/1" }, { "category": "external", "summary": "https://lists.apache.org/thread/cz8qkcwphy4cx8gltn932ln51cbtq6kf", "url": "https://lists.apache.org/thread/cz8qkcwphy4cx8gltn932ln51cbtq6kf" } ], "release_date": "2024-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "No mitigation is currently available for this vulnerability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-02-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2264989" } ], "notes": [ { "category": "description", "text": "An allocation of resources without limits or throttling vulnerability was found in Apache Commons Compress. This issue can lead to an out-of-memory error.", "title": "Vulnerability description" }, { "category": "summary", "text": "commons-compress: OutOfMemoryError unpacking broken Pack200 file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-26308" }, { "category": "external", "summary": "RHBZ#2264989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264989" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26308" }, { "category": "external", "summary": "https://lists.apache.org/thread/ch5yo2d21p7vlqrhll9b17otbyq4npfg", "url": "https://lists.apache.org/thread/ch5yo2d21p7vlqrhll9b17otbyq4npfg" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2024/02/19/2", "url": "https://www.openwall.com/lists/oss-security/2024/02/19/2" } ], "release_date": "2024-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "No mitigation is currently available for this vulnerability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "commons-compress: OutOfMemoryError unpacking broken Pack200 file" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-03-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2269576" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the follow-redirects package. While processing the cross-domain redirection, `follow-redirects` clears authorization headers, however, it misses clearing proxy-authentication headers, which contain credentials as well. This issue may lead to credential leaking, having a high impact on data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Possible credential leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28849" }, { "category": "external", "summary": "RHBZ#2269576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269576" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28849", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849" }, { "category": "external", "summary": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp", "url": "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Possible credential leak" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-03-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270674" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Commons-Configuration2, where a Stack Overflow Error can occur when adding a property in AbstractListDelimiterHandler.flattenIterator(). This issue could allow an attacker to corrupt memory or execute a denial of service attack by crafting malicious property that triggers an out-of-bounds write issue when processed by the vulnerable method.", "title": "Vulnerability description" }, { "category": "summary", "text": "commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29131" }, { "category": "external", "summary": "RHBZ#2270674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29131" }, { "category": "external", "summary": "https://github.com/apache/commons-configuration/commit/56b5c4dcdffbde27870df5a3105d6a5f9b22f554", "url": "https://github.com/apache/commons-configuration/commit/56b5c4dcdffbde27870df5a3105d6a5f9b22f554" }, { "category": "external", "summary": "https://github.com/apache/commons-configuration/commit/7d7d399d0598cb0ca5f81891de34694178156dab", "url": "https://github.com/apache/commons-configuration/commit/7d7d399d0598cb0ca5f81891de34694178156dab" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/CONFIGURATION-840", "url": "https://issues.apache.org/jira/browse/CONFIGURATION-840" } ], "release_date": "2024-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-03-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270673" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Commons-Configuration2, where a Stack Overflow Error occurs when calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree. This issue could allow an attacker to trigger an out-of-bounds write that could lead to memory corruption or cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29133" }, { "category": "external", "summary": "RHBZ#2270673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29133" }, { "category": "external", "summary": "https://github.com/apache/commons-configuration/commit/43f4dab021e9acb8db390db2ae80aa0cee4f9ee4", "url": "https://github.com/apache/commons-configuration/commit/43f4dab021e9acb8db390db2ae80aa0cee4f9ee4" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/CONFIGURATION-841", "url": "https://issues.apache.org/jira/browse/CONFIGURATION-841" } ], "release_date": "2024-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree" }, { "cve": "CVE-2024-29180", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270863" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webpack-dev-middleware package, where it failed to validate the supplied URL address sufficiently before returning local files. This flaw allows an attacker to craft URLs to return arbitrary local files from the developer\u0027s machine. The lack of normalization before calling the middleware also allows the attacker to perform path traversal attacks on the target environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "webpack-dev-middleware: lack of URL validation may lead to file leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in webpack-dev represents a important security issue due to its potential to expose sensitive files and compromise developer machines. By failing to validate URLs and normalize paths effectively, the middleware allows attackers to craft malicious requests that can retrieve arbitrary local files or perform unauthorized path traversal. This could lead to unauthorized access to confidential information, including source code, configuration files, and even system-level files. Given the widespread use of webpack-dev-middleware in web development environments, addressing this vulnerability promptly is important to prevent serious data breaches and protect the integrity of development processes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "known_not_affected": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29180" }, { "category": "external", "summary": "RHBZ#2270863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29180" }, { "category": "external", "summary": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6", "url": "https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6" } ], "release_date": "2024-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-20T00:34:55+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3989" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-MTA-6.2:mta/mta-rhel8-operator@sha256:f588b869c3f273eb20c4c80a9aa5acd4a84c56c1dd85429a39a7d2d60f28d41e_amd64", "9Base-MTA-6.2:mta/mta-hub-rhel9@sha256:325bec37f1ab499f8ae0abb38ca3929f66a0fe63b6ebdf60a1cdc3bbd79ad25e_amd64", "9Base-MTA-6.2:mta/mta-operator-bundle@sha256:a13643117c2867351718a872f7f1b2350c67855ca73a727a1dc140754ffe6589_amd64", "9Base-MTA-6.2:mta/mta-pathfinder-rhel9@sha256:851d4890717247af6aa9b0b6da9be95fe8aeb70183834e9de15a4302c487b9f0_amd64", "9Base-MTA-6.2:mta/mta-ui-rhel9@sha256:0e0167affe099168142b9ebdce5520e972dea63ff6c7f3cda48e0bb4ae4cd0ec_amd64", "9Base-MTA-6.2:mta/mta-windup-addon-rhel9@sha256:7884928eb3d01d4f9c8b5463ef9f6cec7d7df4d669e6d30cafe05af60202b003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webpack-dev-middleware: lack of URL validation may lead to file leak" } ] }
rhsa-2024_4455
Vulnerability from csaf_redhat
Published
2024-07-10 12:40
Modified
2024-12-17 22:47
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.16.0 Images security update
Notes
Topic
Red Hat OpenShift Virtualization release 4.16.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 4.16.0 images.
Security Fix(es):
* axios: exposure of confidential data stored in cookies (CVE-2023-45857)
* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
* jose-go: improper handling of highly compressed data (CVE-2024-28180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.16.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.16.0 images.\n\nSecurity Fix(es):\n\n* axios: exposure of confidential data stored in cookies (CVE-2023-45857)\n\n* golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)\n\n* jose-go: improper handling of highly compressed data (CVE-2024-28180)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4455", "url": "https://access.redhat.com/errata/RHSA-2024:4455" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "2268046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046" }, { "category": "external", "summary": "2268854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268854" }, { "category": "external", "summary": "CNV-18671", "url": "https://issues.redhat.com/browse/CNV-18671" }, { "category": "external", "summary": "CNV-23541", "url": "https://issues.redhat.com/browse/CNV-23541" }, { "category": "external", "summary": "CNV-23927", "url": "https://issues.redhat.com/browse/CNV-23927" }, { "category": "external", "summary": "CNV-28040", "url": "https://issues.redhat.com/browse/CNV-28040" }, { "category": "external", "summary": "CNV-29298", "url": "https://issues.redhat.com/browse/CNV-29298" }, { "category": "external", "summary": "CNV-29431", "url": "https://issues.redhat.com/browse/CNV-29431" }, { "category": "external", "summary": "CNV-29476", "url": "https://issues.redhat.com/browse/CNV-29476" }, { "category": "external", "summary": "CNV-29869", "url": "https://issues.redhat.com/browse/CNV-29869" }, { "category": "external", "summary": "CNV-30877", "url": "https://issues.redhat.com/browse/CNV-30877" }, { "category": "external", "summary": "CNV-31319", "url": "https://issues.redhat.com/browse/CNV-31319" }, { "category": "external", "summary": "CNV-31828", "url": "https://issues.redhat.com/browse/CNV-31828" }, { "category": "external", "summary": "CNV-32664", "url": "https://issues.redhat.com/browse/CNV-32664" }, { "category": "external", "summary": "CNV-32812", "url": "https://issues.redhat.com/browse/CNV-32812" }, { "category": "external", "summary": "CNV-32997", "url": "https://issues.redhat.com/browse/CNV-32997" }, { "category": "external", "summary": "CNV-33184", "url": "https://issues.redhat.com/browse/CNV-33184" }, { "category": "external", "summary": "CNV-33527", "url": "https://issues.redhat.com/browse/CNV-33527" }, { "category": "external", "summary": "CNV-33529", "url": "https://issues.redhat.com/browse/CNV-33529" }, { "category": "external", "summary": "CNV-33701", "url": "https://issues.redhat.com/browse/CNV-33701" }, { "category": "external", "summary": "CNV-33836", "url": "https://issues.redhat.com/browse/CNV-33836" }, { "category": "external", "summary": "CNV-34072", "url": "https://issues.redhat.com/browse/CNV-34072" }, { "category": "external", "summary": "CNV-34180", "url": "https://issues.redhat.com/browse/CNV-34180" }, { "category": "external", "summary": "CNV-34488", "url": "https://issues.redhat.com/browse/CNV-34488" }, { "category": "external", "summary": "CNV-34884", "url": "https://issues.redhat.com/browse/CNV-34884" }, { "category": "external", "summary": "CNV-35213", "url": "https://issues.redhat.com/browse/CNV-35213" }, { "category": "external", "summary": "CNV-35452", "url": "https://issues.redhat.com/browse/CNV-35452" }, { "category": "external", "summary": "CNV-35728", "url": "https://issues.redhat.com/browse/CNV-35728" }, { "category": "external", "summary": "CNV-35729", "url": "https://issues.redhat.com/browse/CNV-35729" }, { "category": "external", "summary": "CNV-35763", "url": "https://issues.redhat.com/browse/CNV-35763" }, { "category": "external", "summary": "CNV-35782", "url": "https://issues.redhat.com/browse/CNV-35782" }, { "category": "external", "summary": "CNV-35859", "url": "https://issues.redhat.com/browse/CNV-35859" }, { "category": "external", "summary": "CNV-36130", "url": "https://issues.redhat.com/browse/CNV-36130" }, { "category": "external", "summary": "CNV-36208", "url": "https://issues.redhat.com/browse/CNV-36208" }, { "category": "external", "summary": "CNV-36209", "url": "https://issues.redhat.com/browse/CNV-36209" }, { "category": "external", "summary": "CNV-36210", "url": "https://issues.redhat.com/browse/CNV-36210" }, { "category": "external", "summary": "CNV-36211", "url": "https://issues.redhat.com/browse/CNV-36211" }, { "category": "external", "summary": "CNV-36271", "url": "https://issues.redhat.com/browse/CNV-36271" }, { "category": "external", "summary": "CNV-36299", "url": "https://issues.redhat.com/browse/CNV-36299" }, { "category": "external", "summary": "CNV-36837", "url": "https://issues.redhat.com/browse/CNV-36837" }, { "category": "external", "summary": "CNV-37111", "url": "https://issues.redhat.com/browse/CNV-37111" }, { "category": "external", "summary": "CNV-37373", "url": "https://issues.redhat.com/browse/CNV-37373" }, { "category": "external", "summary": "CNV-37376", "url": "https://issues.redhat.com/browse/CNV-37376" }, { "category": "external", "summary": "CNV-37377", "url": "https://issues.redhat.com/browse/CNV-37377" }, { "category": "external", "summary": "CNV-37378", "url": "https://issues.redhat.com/browse/CNV-37378" }, { "category": "external", "summary": "CNV-37382", "url": "https://issues.redhat.com/browse/CNV-37382" }, { "category": "external", "summary": "CNV-37383", "url": "https://issues.redhat.com/browse/CNV-37383" }, { "category": "external", "summary": "CNV-37412", "url": "https://issues.redhat.com/browse/CNV-37412" }, { "category": "external", "summary": "CNV-37462", "url": "https://issues.redhat.com/browse/CNV-37462" }, { "category": "external", "summary": "CNV-37501", "url": "https://issues.redhat.com/browse/CNV-37501" }, { "category": "external", "summary": "CNV-37629", "url": "https://issues.redhat.com/browse/CNV-37629" }, { "category": "external", "summary": "CNV-37667", "url": "https://issues.redhat.com/browse/CNV-37667" }, { "category": "external", "summary": "CNV-37685", "url": "https://issues.redhat.com/browse/CNV-37685" }, { "category": "external", "summary": "CNV-37788", "url": "https://issues.redhat.com/browse/CNV-37788" }, { "category": "external", "summary": "CNV-37857", "url": "https://issues.redhat.com/browse/CNV-37857" }, { "category": "external", "summary": "CNV-37859", "url": "https://issues.redhat.com/browse/CNV-37859" }, { "category": "external", "summary": "CNV-38129", "url": "https://issues.redhat.com/browse/CNV-38129" }, { "category": "external", "summary": "CNV-38270", "url": "https://issues.redhat.com/browse/CNV-38270" }, { "category": "external", "summary": "CNV-38375", "url": "https://issues.redhat.com/browse/CNV-38375" }, { "category": "external", "summary": "CNV-38404", "url": "https://issues.redhat.com/browse/CNV-38404" }, { "category": "external", "summary": "CNV-38450", "url": "https://issues.redhat.com/browse/CNV-38450" }, { "category": "external", "summary": "CNV-38568", "url": "https://issues.redhat.com/browse/CNV-38568" }, { "category": "external", "summary": "CNV-38596", "url": "https://issues.redhat.com/browse/CNV-38596" }, { "category": "external", "summary": "CNV-38608", "url": "https://issues.redhat.com/browse/CNV-38608" }, { "category": "external", "summary": "CNV-38609", "url": "https://issues.redhat.com/browse/CNV-38609" }, { "category": "external", "summary": "CNV-38655", "url": "https://issues.redhat.com/browse/CNV-38655" }, { "category": "external", "summary": "CNV-38700", "url": "https://issues.redhat.com/browse/CNV-38700" }, { "category": "external", "summary": "CNV-38707", "url": "https://issues.redhat.com/browse/CNV-38707" }, { "category": "external", "summary": "CNV-38724", "url": "https://issues.redhat.com/browse/CNV-38724" }, { "category": "external", "summary": "CNV-38883", "url": "https://issues.redhat.com/browse/CNV-38883" }, { "category": "external", "summary": "CNV-38887", "url": "https://issues.redhat.com/browse/CNV-38887" }, { "category": "external", "summary": "CNV-38902", "url": "https://issues.redhat.com/browse/CNV-38902" }, { "category": "external", "summary": "CNV-39028", "url": "https://issues.redhat.com/browse/CNV-39028" }, { "category": "external", "summary": "CNV-39030", "url": "https://issues.redhat.com/browse/CNV-39030" }, { "category": "external", "summary": "CNV-39034", "url": "https://issues.redhat.com/browse/CNV-39034" }, { "category": "external", "summary": "CNV-39056", "url": "https://issues.redhat.com/browse/CNV-39056" }, { "category": "external", "summary": "CNV-39101", "url": "https://issues.redhat.com/browse/CNV-39101" }, { "category": "external", "summary": "CNV-39371", "url": "https://issues.redhat.com/browse/CNV-39371" }, { "category": "external", "summary": "CNV-39418", "url": "https://issues.redhat.com/browse/CNV-39418" }, { "category": "external", "summary": "CNV-39421", "url": "https://issues.redhat.com/browse/CNV-39421" }, { "category": "external", "summary": "CNV-39425", "url": "https://issues.redhat.com/browse/CNV-39425" }, { "category": "external", "summary": "CNV-39469", "url": "https://issues.redhat.com/browse/CNV-39469" }, { "category": "external", "summary": "CNV-39558", "url": "https://issues.redhat.com/browse/CNV-39558" }, { "category": "external", "summary": "CNV-39618", "url": "https://issues.redhat.com/browse/CNV-39618" }, { "category": "external", "summary": "CNV-39659", "url": "https://issues.redhat.com/browse/CNV-39659" }, { "category": "external", "summary": "CNV-39682", "url": "https://issues.redhat.com/browse/CNV-39682" }, { "category": "external", "summary": "CNV-39685", "url": "https://issues.redhat.com/browse/CNV-39685" }, { "category": "external", "summary": "CNV-39722", "url": "https://issues.redhat.com/browse/CNV-39722" }, { "category": "external", "summary": "CNV-39727", "url": "https://issues.redhat.com/browse/CNV-39727" }, { "category": "external", "summary": "CNV-39752", "url": "https://issues.redhat.com/browse/CNV-39752" }, { "category": "external", "summary": "CNV-39753", "url": "https://issues.redhat.com/browse/CNV-39753" }, { "category": "external", "summary": "CNV-39878", "url": "https://issues.redhat.com/browse/CNV-39878" }, { "category": "external", "summary": "CNV-39880", "url": "https://issues.redhat.com/browse/CNV-39880" }, { "category": "external", "summary": "CNV-39893", "url": "https://issues.redhat.com/browse/CNV-39893" }, { "category": "external", "summary": "CNV-39940", "url": "https://issues.redhat.com/browse/CNV-39940" }, { "category": "external", "summary": "CNV-39941", "url": "https://issues.redhat.com/browse/CNV-39941" }, { "category": "external", "summary": "CNV-39946", "url": "https://issues.redhat.com/browse/CNV-39946" }, { "category": "external", "summary": "CNV-39978", "url": "https://issues.redhat.com/browse/CNV-39978" }, { "category": "external", "summary": "CNV-39995", "url": "https://issues.redhat.com/browse/CNV-39995" }, { "category": "external", "summary": "CNV-40006", "url": "https://issues.redhat.com/browse/CNV-40006" }, { "category": "external", "summary": "CNV-40120", "url": "https://issues.redhat.com/browse/CNV-40120" }, { "category": "external", "summary": "CNV-40136", "url": "https://issues.redhat.com/browse/CNV-40136" }, { "category": "external", "summary": "CNV-40161", "url": "https://issues.redhat.com/browse/CNV-40161" }, { "category": "external", "summary": "CNV-40162", "url": "https://issues.redhat.com/browse/CNV-40162" }, { "category": "external", "summary": "CNV-40164", "url": "https://issues.redhat.com/browse/CNV-40164" }, { "category": "external", "summary": "CNV-40196", "url": "https://issues.redhat.com/browse/CNV-40196" }, { "category": "external", "summary": "CNV-40200", "url": "https://issues.redhat.com/browse/CNV-40200" }, { "category": "external", "summary": "CNV-40242", "url": "https://issues.redhat.com/browse/CNV-40242" }, { "category": "external", "summary": "CNV-40258", "url": "https://issues.redhat.com/browse/CNV-40258" }, { "category": "external", "summary": "CNV-40334", "url": "https://issues.redhat.com/browse/CNV-40334" }, { "category": "external", "summary": "CNV-40335", "url": "https://issues.redhat.com/browse/CNV-40335" }, { "category": "external", "summary": "CNV-40336", "url": "https://issues.redhat.com/browse/CNV-40336" }, { "category": "external", "summary": "CNV-40341", "url": "https://issues.redhat.com/browse/CNV-40341" }, { "category": "external", "summary": "CNV-40344", "url": "https://issues.redhat.com/browse/CNV-40344" }, { "category": "external", "summary": "CNV-40419", "url": "https://issues.redhat.com/browse/CNV-40419" }, { "category": "external", "summary": "CNV-40445", "url": "https://issues.redhat.com/browse/CNV-40445" }, { "category": "external", "summary": "CNV-40455", "url": "https://issues.redhat.com/browse/CNV-40455" }, { "category": "external", "summary": "CNV-40457", "url": "https://issues.redhat.com/browse/CNV-40457" }, { "category": "external", "summary": "CNV-40598", "url": "https://issues.redhat.com/browse/CNV-40598" }, { "category": "external", "summary": "CNV-40682", "url": "https://issues.redhat.com/browse/CNV-40682" }, { "category": "external", "summary": "CNV-40776", "url": "https://issues.redhat.com/browse/CNV-40776" }, { "category": "external", "summary": "CNV-40846", "url": "https://issues.redhat.com/browse/CNV-40846" }, { "category": "external", "summary": "CNV-40886", "url": "https://issues.redhat.com/browse/CNV-40886" }, { "category": "external", "summary": "CNV-40903", "url": "https://issues.redhat.com/browse/CNV-40903" }, { "category": "external", "summary": "CNV-41084", "url": "https://issues.redhat.com/browse/CNV-41084" }, { "category": "external", "summary": "CNV-41139", "url": "https://issues.redhat.com/browse/CNV-41139" }, { "category": "external", "summary": "CNV-41195", "url": "https://issues.redhat.com/browse/CNV-41195" }, { "category": "external", "summary": "CNV-41199", "url": "https://issues.redhat.com/browse/CNV-41199" }, { "category": "external", "summary": "CNV-41200", "url": "https://issues.redhat.com/browse/CNV-41200" }, { "category": "external", "summary": "CNV-41203", "url": "https://issues.redhat.com/browse/CNV-41203" }, { "category": "external", "summary": "CNV-41206", "url": "https://issues.redhat.com/browse/CNV-41206" }, { "category": "external", "summary": "CNV-41209", "url": "https://issues.redhat.com/browse/CNV-41209" }, { "category": "external", "summary": "CNV-41210", "url": "https://issues.redhat.com/browse/CNV-41210" }, { "category": "external", "summary": "CNV-41224", "url": "https://issues.redhat.com/browse/CNV-41224" }, { "category": "external", "summary": "CNV-41286", "url": "https://issues.redhat.com/browse/CNV-41286" }, { "category": "external", "summary": "CNV-41355", "url": "https://issues.redhat.com/browse/CNV-41355" }, { "category": "external", "summary": "CNV-41385", "url": "https://issues.redhat.com/browse/CNV-41385" }, { "category": "external", "summary": "CNV-41386", "url": "https://issues.redhat.com/browse/CNV-41386" }, { "category": "external", "summary": "CNV-41402", "url": "https://issues.redhat.com/browse/CNV-41402" }, { "category": "external", "summary": "CNV-41474", "url": "https://issues.redhat.com/browse/CNV-41474" }, { "category": "external", "summary": "CNV-41494", "url": "https://issues.redhat.com/browse/CNV-41494" }, { "category": "external", "summary": "CNV-41495", "url": "https://issues.redhat.com/browse/CNV-41495" }, { "category": "external", "summary": "CNV-41503", "url": "https://issues.redhat.com/browse/CNV-41503" }, { "category": "external", "summary": "CNV-41507", "url": "https://issues.redhat.com/browse/CNV-41507" }, { "category": "external", "summary": "CNV-41522", "url": "https://issues.redhat.com/browse/CNV-41522" }, { "category": "external", "summary": "CNV-41526", "url": "https://issues.redhat.com/browse/CNV-41526" }, { "category": "external", "summary": "CNV-41550", "url": "https://issues.redhat.com/browse/CNV-41550" }, { "category": "external", "summary": "CNV-41579", "url": "https://issues.redhat.com/browse/CNV-41579" }, { "category": "external", "summary": "CNV-41590", "url": "https://issues.redhat.com/browse/CNV-41590" }, { "category": "external", "summary": "CNV-41600", "url": "https://issues.redhat.com/browse/CNV-41600" }, { "category": "external", "summary": "CNV-41604", "url": "https://issues.redhat.com/browse/CNV-41604" }, { "category": "external", "summary": "CNV-41632", "url": "https://issues.redhat.com/browse/CNV-41632" }, { "category": "external", "summary": "CNV-41640", "url": "https://issues.redhat.com/browse/CNV-41640" }, { "category": "external", "summary": "CNV-41772", "url": "https://issues.redhat.com/browse/CNV-41772" }, { "category": "external", "summary": "CNV-41804", "url": "https://issues.redhat.com/browse/CNV-41804" }, { "category": "external", "summary": "CNV-41844", "url": "https://issues.redhat.com/browse/CNV-41844" }, { "category": "external", "summary": "CNV-41846", "url": "https://issues.redhat.com/browse/CNV-41846" }, { "category": "external", "summary": "CNV-41959", "url": "https://issues.redhat.com/browse/CNV-41959" }, { "category": "external", "summary": "CNV-42015", "url": "https://issues.redhat.com/browse/CNV-42015" }, { "category": "external", "summary": "CNV-42052", "url": "https://issues.redhat.com/browse/CNV-42052" }, { "category": "external", "summary": "CNV-42087", "url": "https://issues.redhat.com/browse/CNV-42087" }, { "category": "external", "summary": "CNV-42363", "url": "https://issues.redhat.com/browse/CNV-42363" }, { "category": "external", "summary": "CNV-42622", "url": "https://issues.redhat.com/browse/CNV-42622" }, { "category": "external", "summary": "CNV-42786", "url": "https://issues.redhat.com/browse/CNV-42786" }, { "category": "external", "summary": "CNV-42844", "url": "https://issues.redhat.com/browse/CNV-42844" }, { "category": "external", "summary": "CNV-42853", "url": "https://issues.redhat.com/browse/CNV-42853" }, { "category": "external", "summary": "CNV-42884", "url": "https://issues.redhat.com/browse/CNV-42884" }, { "category": "external", "summary": "CNV-43024", "url": "https://issues.redhat.com/browse/CNV-43024" }, { "category": "external", "summary": "CNV-43027", "url": "https://issues.redhat.com/browse/CNV-43027" }, { "category": "external", "summary": "CNV-43033", "url": "https://issues.redhat.com/browse/CNV-43033" }, { "category": "external", "summary": "CNV-43039", "url": "https://issues.redhat.com/browse/CNV-43039" }, { "category": "external", "summary": "CNV-43041", "url": "https://issues.redhat.com/browse/CNV-43041" }, { "category": "external", "summary": "CNV-43069", "url": "https://issues.redhat.com/browse/CNV-43069" }, { "category": "external", "summary": "CNV-43194", "url": "https://issues.redhat.com/browse/CNV-43194" }, { "category": "external", "summary": "CNV-43205", "url": "https://issues.redhat.com/browse/CNV-43205" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4455.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.16.0 Images security update", "tracking": { "current_release_date": "2024-12-17T22:47:29+00:00", "generator": { "date": "2024-12-17T22:47:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4455", "initial_release_date": "2024-07-10T12:40:58+00:00", "revision_history": [ { "date": "2024-07-10T12:40:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-10T12:40:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:47:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.16 for RHEL 9", "product": { "name": "CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.16::el9" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "product": { "name": "container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "product_id": "container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "product_identification_helper": { "purl": "pkg:oci/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-controller-rhel9\u0026tag=v4.16.0-99" } } }, { "category": "product_version", "name": "container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "product": { "name": "container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "product_id": "container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "product_identification_helper": { "purl": "pkg:oci/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-operator-rhel9\u0026tag=v4.16.0-114" } } }, { "category": "product_version", "name": "container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "product": { "name": "container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "product_id": "container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "product_identification_helper": { "purl": "pkg:oci/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-server-rhel9\u0026tag=v4.16.0-114" } } }, { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.16.0-113" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.16.0-115" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.16.0-110" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.16.0-55" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.16.0.rhel9-2746" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.16.0-153" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.16.0-149" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.16.0-154" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.16.0-198" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.16.0-197" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.16.0-112" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.16.0-113" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "product": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "product_id": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-apiserver-proxy-rhel9\u0026tag=v4.16.0-117" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "product": { "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "product_id": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-common-instancetypes-rhel9\u0026tag=v4.16.0-73" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.16.0-4001" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.16.0-162" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "product": { "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "product_id": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-realtime-checkup-rhel9\u0026tag=v4.16.0-159" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.16.0-191" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "product": { "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "product_id": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-storage-checkup-rhel9\u0026tag=v4.16.0-107" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.16.0-147" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.16.0-122" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.16.0-67" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.16.0-274" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "product": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "product_id": "container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-controller-rhel9\u0026tag=v4.16.0-614" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "product": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "product_id": "container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-lock-server-rhel9\u0026tag=v4.16.0-164" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "product": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "product_id": "container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "product_identification_helper": { "purl": "pkg:oci/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-operator-rhel9\u0026tag=v4.16.0-164" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.16.0-114" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.16.0-111" } } }, { "category": "product_version", "name": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "product": { "name": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "product_id": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "product_identification_helper": { "purl": "pkg:oci/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/passt-network-binding-plugin-cni-rhel9\u0026tag=v4.16.0-85" } } }, { "category": "product_version", "name": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "product": { "name": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "product_id": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "product_identification_helper": { "purl": "pkg:oci/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9\u0026tag=v4.16.0-86" } } }, { "category": "product_version", "name": "container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "product": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "product_id": "container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "product_identification_helper": { "purl": "pkg:oci/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/pr-helper-rhel9\u0026tag=v4.16.0-298" } } }, { "category": "product_version", "name": "container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "product": { "name": "container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "product_id": "container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "product_identification_helper": { "purl": "pkg:oci/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/sidecar-shim-rhel9\u0026tag=v4.16.0-3805" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.16.0-297" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.16.0-174" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.16.0-169" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.16.0-169" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.16.0-170" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.16.0-167" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.16.0-168" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.16.0-167" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.16.0-169" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.16.0-297" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.16.0-298" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.16.0-297" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.16.0-296" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.16.0-130" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.16.0-297" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.16.0-304" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.16.0-178" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.16.0-114" } } }, { "category": "product_version", "name": "container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64", "product": { "name": "container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64", "product_id": "container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64", "product_identification_helper": { "purl": "pkg:oci/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/wasp-agent-rhel9\u0026tag=v4.16.0-39" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "product": { "name": "container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "product_id": "container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "product_identification_helper": { "purl": "pkg:oci/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-controller-rhel9\u0026tag=v4.16.0-99" } } }, { "category": "product_version", "name": "container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "product": { "name": "container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "product_id": "container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "product_identification_helper": { "purl": "pkg:oci/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-operator-rhel9\u0026tag=v4.16.0-114" } } }, { "category": "product_version", "name": "container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "product": { "name": "container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "product_id": "container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "product_identification_helper": { "purl": "pkg:oci/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/aaq-server-rhel9\u0026tag=v4.16.0-114" } } }, { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.16.0-113" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.16.0-115" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.16.0-110" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.16.0-55" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.16.0.rhel9-2746" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.16.0-153" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.16.0-149" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.16.0-154" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.16.0-198" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.16.0-197" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.16.0-112" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.16.0-113" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "product": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "product_id": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-apiserver-proxy-rhel9\u0026tag=v4.16.0-117" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "product": { "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "product_id": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-common-instancetypes-rhel9\u0026tag=v4.16.0-73" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.16.0-4001" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.16.0-162" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "product": { "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "product_id": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-realtime-checkup-rhel9\u0026tag=v4.16.0-159" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.16.0-191" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "product": { "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "product_id": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-storage-checkup-rhel9\u0026tag=v4.16.0-107" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.16.0-147" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.16.0-122" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.16.0-67" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.16.0-274" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "product": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "product_id": "container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-controller-rhel9\u0026tag=v4.16.0-614" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "product": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "product_id": "container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-lock-server-rhel9\u0026tag=v4.16.0-164" } } }, { "category": "product_version", "name": "container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "product": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "product_id": "container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "product_identification_helper": { "purl": "pkg:oci/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/mtq-operator-rhel9\u0026tag=v4.16.0-164" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.16.0-114" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.16.0-111" } } }, { "category": "product_version", "name": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "product": { "name": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "product_id": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "product_identification_helper": { "purl": "pkg:oci/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/passt-network-binding-plugin-cni-rhel9\u0026tag=v4.16.0-85" } } }, { "category": "product_version", "name": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "product": { "name": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "product_id": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "product_identification_helper": { "purl": "pkg:oci/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9\u0026tag=v4.16.0-86" } } }, { "category": "product_version", "name": "container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "product": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "product_id": "container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "product_identification_helper": { "purl": "pkg:oci/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/pr-helper-rhel9\u0026tag=v4.16.0-298" } } }, { "category": "product_version", "name": "container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "product": { "name": "container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "product_id": "container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "product_identification_helper": { "purl": "pkg:oci/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/sidecar-shim-rhel9\u0026tag=v4.16.0-3805" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.16.0-297" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.16.0-174" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.16.0-169" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.16.0-169" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.16.0-170" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.16.0-167" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.16.0-168" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.16.0-167" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.16.0-169" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.16.0-297" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.16.0-298" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.16.0-297" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.16.0-296" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.16.0-130" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.16.0-297" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.16.0-304" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.16.0-178" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.16.0-114" } } }, { "category": "product_version", "name": "container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "product": { "name": "container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "product_id": "container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "product_identification_helper": { "purl": "pkg:oci/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/wasp-agent-rhel9\u0026tag=v4.16.0-39" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64" }, "product_reference": "container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64" }, "product_reference": "container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64" }, "product_reference": "container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64" }, "product_reference": "container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64" }, "product_reference": "container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64" }, "product_reference": "container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64" }, "product_reference": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64" }, "product_reference": "container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64" }, "product_reference": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64" }, "product_reference": "container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64" }, "product_reference": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64" }, "product_reference": "container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64" }, "product_reference": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64" }, "product_reference": "container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64" }, "product_reference": "container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64" }, "product_reference": "container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64" }, "product_reference": "container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64" }, "product_reference": "container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64" }, "product_reference": "container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64" }, "product_reference": "container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64" }, "product_reference": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64" }, "product_reference": "container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64" }, "product_reference": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64" }, "product_reference": "container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64" }, "product_reference": "container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64" }, "product_reference": "container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64" }, "product_reference": "container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64" }, "product_reference": "container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64" }, "product_reference": "container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "relates_to_product_reference": "9Base-CNV-4.16" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64 as a component of CNV 4.16 for RHEL 9", "product_id": "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" }, "product_reference": "container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64", "relates_to_product_reference": "9Base-CNV-4.16" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2248979" } ], "notes": [ { "category": "description", "text": "A flaw was found in Axios that may expose a confidential session token. This issue can allow a remote attacker to bypass security measures and view sensitive data.", "title": "Vulnerability description" }, { "category": "summary", "text": "axios: exposure of confidential data stored in cookies", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected container was deprecated in ACM 2.5 version which is not anymore supported. Following versions of this product are not impacted by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64" ], "known_not_affected": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45857" }, { "category": "external", "summary": "RHBZ#2248979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" } ], "release_date": "2023-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-10T12:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4455" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "axios: exposure of confidential data stored in cookies" }, { "cve": "CVE-2024-24786", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-03-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2268046" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang\u0027s protobuf module, where the unmarshal function can enter an infinite loop when processing certain invalid inputs. This issue occurs during unmarshaling into a message that includes a google.protobuf.Any or when the UnmarshalOptions.DiscardUnknown option is enabled. This flaw allows an attacker to craft malicious input tailored to trigger the identified flaw in the unmarshal function. By providing carefully constructed invalid inputs, they could potentially cause the function to enter an infinite loop, resulting in a denial of service condition or other unintended behaviors in the affected system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64" ], "known_not_affected": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-24786" }, { "category": "external", "summary": "RHBZ#2268046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-24786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24786" }, { "category": "external", "summary": "https://go.dev/cl/569356", "url": "https://go.dev/cl/569356" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/", "url": "https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-2611", "url": "https://pkg.go.dev/vuln/GO-2024-2611" } ], "release_date": "2024-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-10T12:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4455" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON" }, { "cve": "CVE-2024-28180", "cwe": { "id": "CWE-409", "name": "Improper Handling of Highly Compressed Data (Data Amplification)" }, "discovery_date": "2024-03-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2268854" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Jose due to improper handling of highly compressed data. This issue could allow an attacker to send a JWE containing compressed data that uses large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose-go: improper handling of highly compressed data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64" ], "known_not_affected": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28180" }, { "category": "external", "summary": "RHBZ#2268854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28180" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g", "url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g" } ], "release_date": "2024-03-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-10T12:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4455" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:071548d4f3f40fabe5640a034614ba851dfc7dd44d34e254ff6f14316bca5493_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-controller-rhel9@sha256:512f4e4ff422126f80d320046a5e382af23ae907ce1dfde89d839509c3bb74b9_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:a3503890693f678cfe2aa10a1654f457acc09256b526c1cdbbe16e3dcad25e36_arm64", "9Base-CNV-4.16:container-native-virtualization/aaq-operator-rhel9@sha256:e0ea05fcbeb5410202db5324df4a4e226f987c50384f0642e8fcba1756ea6216_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:6652bcac93c626c7eb8a1e3cd02cb481d28cf798a868c8a6279ad0abcd44e718_amd64", "9Base-CNV-4.16:container-native-virtualization/aaq-server-rhel9@sha256:9f6ddda7f53a7fcb5d49ae2198296127e2f64d4de35a7ba94d939c89274f5f65_arm64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:23efd84e61f779cec3178fc29e43395b195444b75267663f5da1c948c9c8fdb0_amd64", "9Base-CNV-4.16:container-native-virtualization/bridge-marker-rhel9@sha256:f3b2fffe4c033578e7553978b2543ef6d18e310485f0a8e8c6bc7d9e590256b9_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:41db645b78dab1cc23ae735705fb80f4583c553113862d4a6abf59a01d5d505f_arm64", "9Base-CNV-4.16:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:9102ce4d7ad07be7d47999b1d15f356dedf90dacb0ce249fd5f5d9b7271fab1b_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bef63bf31e1637cd7245c2da670bb89fbea1bbf0c2ba374eb5c4877dfc50c8ff_arm64", "9Base-CNV-4.16:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:ffba4dedfaef9af4079ee0dac56790f712d32690d7f65b7f880227a0d7c0e51a_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:0931d6c620f004ffc3508a5aad311ddc793290e03229047410d59adcfc5f92d6_amd64", "9Base-CNV-4.16:container-native-virtualization/cnv-must-gather-rhel9@sha256:8d4ebbaea042a3b03057a889acdee001c5d440e54596dbe5c79d0a42b8585de7_arm64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:38b884ec0ff34001faba8ff794de6f24d78854a5d02220e7e698ceeaf6fd0c27_amd64", "9Base-CNV-4.16:container-native-virtualization/hco-bundle-registry-rhel9@sha256:d77c2d87fd8662ee468b4201e102fef2a63fa632aca041831a86d517d414bc72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:bfd35d9a41ec1299a2fb731c7bc59fa3e29f99a2adb5f35b6c0b1de3dc6d4e81_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:f5480efb2f5da13c597cdb980ecac06a823091f8ef71a953fdad2c65dd881587_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:133a406e2ecd66493f60c017202ed5d8590746438c6ad6e1ec08a7ea820b6b61_amd64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:6a567b98782553844c593b451575a8b3efca7510981b42ec612ed9c043e06c72_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:6bfe59a664845cd5c276fe1149a62b914833196c8ad2c8513b6004b60ad5a9a8_arm64", "9Base-CNV-4.16:container-native-virtualization/hostpath-provisioner-rhel9@sha256:82eae4ac0150477978a037da657c2d92e4a5c3acd7c52216d90a2ae76df4f4cf_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:b4df0c8581b2c71a23a35f7f171c20408b8578b23d56607dd79ab15f4df9b74b_arm64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:ec7b547ebe92be21ef909724e71d69e0c37abd56cd4d8094c463fdc39c56f6f1_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:27d74031de11e457425dcb856c5fb3178237b12807d49ecbaf7051cc2a48211e_amd64", "9Base-CNV-4.16:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:5586d9c22a9c3bf2f5a2556f2dfc7f7c4e2fbbd0f0a44f1962164a6c46b0dcce_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:30a77dd0b6b663d13cf8b65c6da98bb3347619e8536c32914d5ef78ab9b5fbac_arm64", "9Base-CNV-4.16:container-native-virtualization/kubemacpool-rhel9@sha256:cb591b994af004ff0c4f67b201fd8a7baf89117a25010e23deb6d4a9b0571675_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:3fb0b2fed6443fa7e795676a13a6f3c3fa19629e55c3baee26c8f7435ff3ed9d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubesecondarydns-rhel9@sha256:91f56d3ee3753bb5eb799e4fabab459a25447ff76053f7bd8cb11f1448c0eecb_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:6f9dd2db57c9bdc0350cda3f5bfa2044b4001d51e66f8316ea69390e5dd897fd_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-apiserver-proxy-rhel9@sha256:bab6b5e5987b8f1625be5ac67a1649b8635136c8ac0c4c9c03d25095ca95b2d6_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:1212f10fc0937481ffd75fae28869a5de951f319123cac29919520c6fd456d93_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-common-instancetypes-rhel9@sha256:f439cadea6b3e4f79e66aadfd7d3338bad744d7065e16c4ef2e7568d430d1e27_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:50fcdb03e9360665ec7d7958a292c92fa4dd00c557a5bdff29de109a13b0dcb2_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:f9b3eea3cb7ea905551caf1575113497131293cb59926f927af91893f1a15735_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:b674b2ea0c8980066f108e51cc88bad345129892c8b82e11b3eba52fb657fe07_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:f6b7e7796e80a686ebb395d2480e387e5d659a5a407ba107439de4aeaf4e8cd1_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:445b5051f7a102f622a8afb85b983de5ec9265df2d7f440645eed011556bf86d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-realtime-checkup-rhel9@sha256:e57c0fb7d45a8eb479c9476948f625eb008108912d8d325316dfecd5a0f24748_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:be1818c1b7aacd0aa048fc679b60fa2fe34bebe7480d94132b1d9da45c705d1d_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:f01a87ab0fb1da031f7b78988edf60401e4f44e33fd2431611efb1045e266162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:27a51fef8ce604209a809241534d2f0fb206e83d06efe44527e2e12f99ee5da5_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-storage-checkup-rhel9@sha256:cf7e0bbb92507c5070eab026e2b5329da5340b420145e23a9b16c38cbe8fb45a_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:466771ce1b169c5d6423c79753aaf3a75b98ad8ea64036028f500d1b703ad957_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:b757a9d9f3050a932875e6f56b9c99083e9dd74b6cb0607dc431bf9c54df4162_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a6a3b762cc76e331da48b4296b27140181b83ad5fe001cd862c6da135ed32bb2_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:d948ca6254aadf8503eaf4a591ee0e27cca613c07abdd94e8db0fef713cb4d09_amd64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:0c01bb884f29f465c879c65373d143766258dc4ab853f2101b31623276c5ba0d_arm64", "9Base-CNV-4.16:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:4432d1728d8a723fa25d58cb156160e351ec13e395d9e085887cb148a2a352b8_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:4a2574eed528c317bcf72f66d39095acc92ffc50512e6cc1eafd75612359d193_amd64", "9Base-CNV-4.16:container-native-virtualization/libguestfs-tools-rhel9@sha256:c1534dc154d1520cacb7e928e3391e423e036baf996f05c5775f624810056049_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:47fd4c78b1db62bf48cd91ed1f8c5e3eb91574fb9f5bb8f5df8ceef2b326bd32_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-controller-rhel9@sha256:77cdd516e79735bae3acf7a730f6ed8afb2068e1e698dcbfb19d72d33813c4dc_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:3dd6edd2e0f0a3fa66e7fcc5378ddd0b23de8fa3c998c3bdd111ab5b8907bba3_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-lock-server-rhel9@sha256:b9a08d37cd420a6f4407e901f275fff068d59cf49e69e942cf65f32ff95bfad2_amd64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:69d3ce8dc68e5374010d46d69300e2fd44597a69bbde2f2b427455d0a1577ce7_arm64", "9Base-CNV-4.16:container-native-virtualization/mtq-operator-rhel9@sha256:ae6e612d60338f3e6b42c050dd77e1e41e0e7981605e6d4486a44a3b122d8b0f_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:446eea9582f4b8f13c81a51a1c944d0896861b198d59939b4be017e004ed7200_amd64", "9Base-CNV-4.16:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:d1e6974874e0f988205e5c8e7ced23d2753887a7ab0837cc9ce8f9dfe72e27f3_arm64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:7b3bcf2122966d86b7a8b11f556083a73524abd614dbc06a6efa96471fef7312_amd64", "9Base-CNV-4.16:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:854293bed7fcdb8233cf743d005772505f56ba8b1265674c214ba20cc7bc27a6_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:044d72b7de1453c920b85bf3290a3a3469d476ba961ea25a3d18707a87da515d_arm64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-cni-rhel9@sha256:2a2d72aadeddf7e4eedb221b0ac72045facb45d27adfc2667a5b6b84f3a5b4be_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:314d449d8968be818697ef6afc780c2d18d59db198615018c88883579ecfefe0_amd64", "9Base-CNV-4.16:container-native-virtualization/passt-network-binding-plugin-sidecar-rhel9@sha256:e9b6cdd9129c283e113a35b87500c951c0515d3db45cdfb896a9f62f4d1e4935_arm64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:b77685c11f1c5fd88d9fe6cc6580d24bf8f798c4dc1067870feb1a8dc10e633e_amd64", "9Base-CNV-4.16:container-native-virtualization/pr-helper-rhel9@sha256:d712ec25c980df63dd01b8c0ef2238bccdeea11f275cb37b268b93a1d33d7885_arm64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:1cf3fc8b846e029c9fbcee2a0ee435388c22b0078b4fc429700bd6042913244a_amd64", "9Base-CNV-4.16:container-native-virtualization/sidecar-shim-rhel9@sha256:25b25d6e044de68d45fe30b50f5f3eee53e9af715efaae5e5e03c8d578399eca_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:188cceb513910902552f148819d4bd9025a9740d6ed2abfc765d36c1d78c3f98_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-api-rhel9@sha256:71bddfa8015fa4fa15ad1db6c3e7e4f83ea95bd12e43ff9981026206e072b87d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:5b6098f2b7a2cde9b5c18bde347743c68b4b64d0b78bf032a75bfc66416b3833_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-artifacts-server-rhel9@sha256:aadc756309a5d3b1e187fcfaa17739a1269a5e5c87c7e1875f8852b252dd6205_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:453998e8404c9d3d45f249609f2c1e195efadec4280dd96c6e6d319cf5eb9151_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f5f2da46f66f8e840222412d916df2750ccd8ce4a3352287fbc87ff6c01e3282_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:37fc3f68e4969352e13145e2c1298854a56767913eb0acdc5fcf617a788ffd02_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:adfed48ee7a200bd22b934b9309af86225929df71a62bfcf4d8d988a95bcdf89_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:42890a0b6b521a1c6e87f978f1bd6e97fccf40ad1b6a591cd63ec72f293448c5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-controller-rhel9@sha256:ab4d365d1a4df9e147f1f99d343892e9d4af7bd7d3e31ed76c0d07ec5c3671bb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:caef2acb5e0fba4cb0ab978ba4018ab7ebef0e1e0d7a48cfd4f1180900447751_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-importer-rhel9@sha256:dcad5c0e11af375b900bed2b1da0a809000384abf1782fa3354734d1455a4cb4_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:0d738e5050c642f1c1e30a8c092b16edb406f75c262971fc038fac31c87f0a57_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-operator-rhel9@sha256:4cc2dc92c151f2ccad5a17bcd1c4498505b08a2709abf9f3098881193499c149_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:4734a37f04063c7c269b453c83f4432f9a9cfa6adaadcab615e6aaf76100ee05_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:78ff724985b4fad5dde643553ffbc1eaf6eaa957c4128e6979f519b7beaee962_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:bf6be096ead19a96b6ecdbdacd13f4a6aeffcfd782faca9e7e7a8f0eec7e1fee_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:fcf3b6a84823fa8b2a7a531d574e171439930e338724d1ec2b95f8939417f9c8_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:4540221b275f2338c04e97ff5187ddde59c2fbd3a30c16bbded5cf408ff69221_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-controller-rhel9@sha256:7bbda5f026b373bf7378e62d381499319f1f580917b27b053b7ef992e12a63b5_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:569d0a4e3d35b3aaa2daf626cf2c48311bbf0492c26384fbd68510dec9381595_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportproxy-rhel9@sha256:e65bb4aa65bf0098b5188908bd93b9a3eb4df91a3799f7529c473d809b46f02f_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:6a1562be0ed114e57bf6cbf74b3996886dc63bcc559e10628b570761d49de5eb_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-exportserver-rhel9@sha256:d50d30aea7e23f4d5fc97fc3293cb8786d578ed04402ec897a1a6b602c4c362d_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:7808c4d0d083c3925b7a03b22a9df236b991493509b809712f40dd3dbb6b95c9_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-handler-rhel9@sha256:9edd4f17a1cd4cb140a4cb6345150c370baebb397af00ad184efa6ce5f228268_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:4f5d13a60f3cad35e8793384d489aae83712cbaf306e30d7ea5fc672cc592694_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-launcher-rhel9@sha256:58f4ddd3085bb2fedf0260aa2d797c15efe2569fd4288157cbff944379acf4e0_amd64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:1182f8951898638640a5aaa814a73d2ec2c0b8c7a64ef08e35645af07faee300_arm64", "9Base-CNV-4.16:container-native-virtualization/virt-operator-rhel9@sha256:be0e094918f7737eb3e0e1785d3643c892d42dab10ff52614887f5b5399486dc_amd64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:0c8a3835fde9207d4c481b809b7ae08bac4cd4ff2e17feb31c3e4c9968e8b9ef_arm64", "9Base-CNV-4.16:container-native-virtualization/virtio-win-rhel9@sha256:8f4906d234e901547693013c16d455e464fe61072b8d0d4339b0acc30a8ed48a_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bb1368377ed9e58b097df171efebe4854b77e6fe5f0f71312d0bc50fe2522158_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-console-proxy-rhel9@sha256:bcf09bf013542a447989dd6c0ba3ff7188170306dadc8630585a055b01dcf7f5_arm64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:11fe474796b959c2a9c65918ccde32c5b383aa410018815ea6455771e2ff4a20_amd64", "9Base-CNV-4.16:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:4235be2c9877ebe69dd96d3320e156eaf824eab84e2ce57fe2e62f6a8b480d52_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:8042c68fe01657c96c5cf35befd29fb38c6e2638c48ee5a12839e9b0b491dff5_arm64", "9Base-CNV-4.16:container-native-virtualization/wasp-agent-rhel9@sha256:990b779243237d87acffc1101512776611f21d25c6142ce06e50c73f49b16496_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose-go: improper handling of highly compressed data" } ] }
wid-sec-w-2024-0277
Vulnerability from csaf_certbund
Published
2024-02-01 23:00
Modified
2024-02-01 23:00
Summary
IBM Business Automation Workflow: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Business Automation Workflow ist eine Lösung zur Automatisierung von Arbeitsabläufen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um einen Cross-Site-Scripting-Angriff zu starten, einen Phishing-Angriff durchzuführen, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um einen Cross-Site-Scripting-Angriff zu starten, einen Phishing-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0277 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0277.json" }, { "category": "self", "summary": "WID-SEC-2024-0277 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0277" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-02-01", "url": "https://www.ibm.com/support/pages/node/7114422" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-02-01", "url": "https://www.ibm.com/support/pages/node/7114423" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-02-01", "url": "https://www.ibm.com/support/pages/node/7114425" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-01T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:59:00.312+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0277", "initial_release_date": "2024-02-01T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-01T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow \u003c 23.0.2-IF001", "product": { "name": "IBM Business Automation Workflow \u003c 23.0.2-IF001", "product_id": "T032483", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:23.0.2-if001" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow \u003c 21.0.3-IF029", "product": { "name": "IBM Business Automation Workflow \u003c 21.0.3-IF029", "product_id": "T032484", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:21.0.3-if029" } } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-02-01T23:00:00Z", "title": "CVE-2023-45857" }, { "cve": "CVE-2023-26159", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-02-01T23:00:00Z", "title": "CVE-2023-26159" }, { "cve": "CVE-2023-31582", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Business Automation Workflow. Dieser Fehler besteht im Jose4J-Paket und wird dadurch verursacht, dass eine niedrige Iterationszahl von 1000 oder weniger zugelassen wird. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um gehashte Passwortwerte zu erhalten." } ], "release_date": "2024-02-01T23:00:00Z", "title": "CVE-2023-31582" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Business Automation Workflow. Dieser Fehler besteht in der Komponente snappy-java aufgrund einer fehlenden \u00dcberpr\u00fcfung der Obergrenze f\u00fcr die Chunk-L\u00e4nge. Durch das Senden einer speziell gestalteten Anfrage kann ein entfernter, anonymer Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-02-01T23:00:00Z", "title": "CVE-2023-43642" } ] }
wid-sec-w-2024-0588
Vulnerability from csaf_certbund
Published
2024-03-07 23:00
Modified
2024-03-07 23:00
Summary
IBM App Connect Enterprise: Schwachstelle ermöglicht Cross-Site Request Forgery
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM App Connect Enterprise kombiniert die branchenbewährten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM App Connect Enterprise ausnutzen, um Cross-Site-Scripting-Angriffe, Web-Cache-Poisoning und andere bösartige Aktivitäten durchzuführen
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM App Connect Enterprise kombiniert die branchenbew\u00e4hrten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM App Connect Enterprise ausnutzen, um Cross-Site-Scripting-Angriffe, Web-Cache-Poisoning und andere b\u00f6sartige Aktivit\u00e4ten durchzuf\u00fchren", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0588 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0588.json" }, { "category": "self", "summary": "WID-SEC-2024-0588 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0588" }, { "category": "external", "summary": "IBM Security Bulletin 7130998 vom 2024-03-07", "url": "https://www.ibm.com/support/pages/node/7130998" } ], "source_lang": "en-US", "title": "IBM App Connect Enterprise: Schwachstelle erm\u00f6glicht Cross-Site Request Forgery", "tracking": { "current_release_date": "2024-03-07T23:00:00.000+00:00", "generator": { "date": "2024-03-08T12:35:54.510+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0588", "initial_release_date": "2024-03-07T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-07T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "12.0.1.0 - 12.0.10.0", "product": { "name": "IBM App Connect Enterprise 12.0.1.0 - 12.0.10.0", "product_id": "T032246", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.10.0" } } }, { "category": "product_version", "name": "11.0.0.1 - 11.0.0.23", "product": { "name": "IBM App Connect Enterprise 11.0.0.1 - 11.0.0.23", "product_id": "T032247", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:11.0.0.1_-_11.0.0.23" } } } ], "category": "product_name", "name": "App Connect Enterprise" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "notes": [ { "category": "description", "text": "In IBM App Connect Enterprise existiert eine Schwachstelle in der Axios Komponente. Benutzereingaben werden nur ungen\u00fcgend validiert, wodurch ein Cross-Site Request Forgery m\u00f6glich wird. Ein entfernter, anonymer Angreifer kann unter bestimmten Umst\u00e4nden durch das Einf\u00fcgen des X-XSRF-TOKEN-Headers mit einem geheimen XSRF-TOKEN-Cookie-Wert in Anfragen an einen beliebigen Server, Cross-Site-Scripting-Angriffe, Web-Cache-Poisoning und andere b\u00f6sartige Aktivit\u00e4ten durchf\u00fchren Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T032247", "T032246" ] }, "release_date": "2024-03-07T23:00:00Z", "title": "CVE-2023-45857" } ] }
WID-SEC-W-2024-1226
Vulnerability from csaf_certbund
Published
2024-05-22 22:00
Modified
2024-06-13 22:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern oder um weitere nicht spezifizierte Angriffe auszuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1226 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1226.json" }, { "category": "self", "summary": "WID-SEC-2024-1226 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1226" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2874 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2874" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2929 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2929" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2930 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2930" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2932 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2932" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2933 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2933" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2874 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2901 vom 2024-05-23", "url": "https://access.redhat.com/errata/RHSA-2024:2901" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3473 vom 2024-05-29", "url": "https://access.redhat.com/errata/RHSA-2024:3473" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3790 vom 2024-06-11", "url": "https://access.redhat.com/errata/RHSA-2024:3790" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3715 vom 2024-06-12", "url": "https://access.redhat.com/errata/RHSA-2024:3715" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3314 vom 2024-06-13", "url": "https://access.redhat.com/errata/RHSA-2024:3314" }, { "category": "external", "summary": "RedHat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2024:3919" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-13T22:00:00.000+00:00", "generator": { "date": "2024-06-14T08:08:23.564+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1226", "initial_release_date": "2024-05-22T22:00:00.000+00:00", "revision_history": [ { "date": "2024-05-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-05-23T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-13T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "T035142", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T035034", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version_range", "name": "Migration Toolkit for Applications \u003c7.0.3", "product": { "name": "Red Hat OpenShift Migration Toolkit for Applications \u003c7.0.3", "product_id": "T035036", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:migration_toolkit_for_applications__7.0.3" } } }, { "category": "product_version", "name": "Custom Metric Autoscaler 2", "product": { "name": "Red Hat OpenShift Custom Metric Autoscaler 2", "product_id": "T035047", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:custom_metric_autoscaler_2" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-26555", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2020-26555" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-29390", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2021-29390" }, { "cve": "CVE-2021-43618", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2021-43618" }, { "cve": "CVE-2022-0480", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-0480" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-40090", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-40090" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-48554", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-48554" }, { "cve": "CVE-2022-48624", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-48624" }, { "cve": "CVE-2023-24023", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-24023" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25775", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-25775" }, { "cve": "CVE-2023-26159", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-26159" }, { "cve": "CVE-2023-26364", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-26364" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28866", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-28866" }, { "cve": "CVE-2023-2975", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-2975" }, { "cve": "CVE-2023-31083", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-31083" }, { "cve": "CVE-2023-31122", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-31122" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3567", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-3567" }, { "cve": "CVE-2023-3618", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-3618" }, { "cve": "CVE-2023-37453", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-37453" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-38469", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38469" }, { "cve": "CVE-2023-38470", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38470" }, { "cve": "CVE-2023-38471", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38471" }, { "cve": "CVE-2023-38472", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38472" }, { "cve": "CVE-2023-38473", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38473" }, { "cve": "CVE-2023-38546", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38546" }, { "cve": "CVE-2023-39189", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39189" }, { "cve": "CVE-2023-39193", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39193" }, { "cve": "CVE-2023-39194", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39194" }, { "cve": "CVE-2023-39198", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39198" }, { "cve": "CVE-2023-39326", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39326" }, { "cve": "CVE-2023-40745", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-40745" }, { "cve": "CVE-2023-41175", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-41175" }, { "cve": "CVE-2023-4133", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-4133" }, { "cve": "CVE-2023-42754", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42756", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-42756" }, { "cve": "CVE-2023-43785", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43785" }, { "cve": "CVE-2023-43786", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43786" }, { "cve": "CVE-2023-43787", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43787" }, { "cve": "CVE-2023-43788", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43788" }, { "cve": "CVE-2023-43789", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43789" }, { "cve": "CVE-2023-4408", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-4408" }, { "cve": "CVE-2023-45286", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45286" }, { "cve": "CVE-2023-45287", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45287" }, { "cve": "CVE-2023-45288", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45288" }, { "cve": "CVE-2023-45289", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45289" }, { "cve": "CVE-2023-45290", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45290" }, { "cve": "CVE-2023-45857", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45857" }, { "cve": "CVE-2023-45863", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45863" }, { "cve": "CVE-2023-46218", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46862", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-46862" }, { "cve": "CVE-2023-47038", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-47038" }, { "cve": "CVE-2023-48631", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-48631" }, { "cve": "CVE-2023-50387", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-50387" }, { "cve": "CVE-2023-50868", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-50868" }, { "cve": "CVE-2023-51043", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51779", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-51779" }, { "cve": "CVE-2023-51780", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-51780" }, { "cve": "CVE-2023-52425", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52434", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52434" }, { "cve": "CVE-2023-52448", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52448" }, { "cve": "CVE-2023-52476", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52476" }, { "cve": "CVE-2023-52489", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52489" }, { "cve": "CVE-2023-52522", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52522" }, { "cve": "CVE-2023-52529", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52529" }, { "cve": "CVE-2023-52574", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52574" }, { "cve": "CVE-2023-52578", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52578" }, { "cve": "CVE-2023-52580", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52580" }, { "cve": "CVE-2023-52581", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52581" }, { "cve": "CVE-2023-52597", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52597" }, { "cve": "CVE-2023-52610", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52610" }, { "cve": "CVE-2023-52620", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52620" }, { "cve": "CVE-2023-5678", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-5678" }, { "cve": "CVE-2023-6040", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6121", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6121" }, { "cve": "CVE-2023-6129", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6129" }, { "cve": "CVE-2023-6176", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6176" }, { "cve": "CVE-2023-6228", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6228" }, { "cve": "CVE-2023-6237", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6237" }, { "cve": "CVE-2023-6240", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6240" }, { "cve": "CVE-2023-6531", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6531" }, { "cve": "CVE-2023-6546", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6546" }, { "cve": "CVE-2023-6622", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6622" }, { "cve": "CVE-2023-6915", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6915" }, { "cve": "CVE-2023-6931", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6931" }, { "cve": "CVE-2023-6932", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6932" }, { "cve": "CVE-2023-7008", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-7008" }, { "cve": "CVE-2024-0565", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0727", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-0727" }, { "cve": "CVE-2024-0841", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-0841" }, { "cve": "CVE-2024-1085", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-1085" }, { "cve": "CVE-2024-1086", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-1086" }, { "cve": "CVE-2024-1394", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-1394" }, { "cve": "CVE-2024-1488", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-1488" }, { "cve": "CVE-2024-21011", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21011" }, { "cve": "CVE-2024-21012", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21012" }, { "cve": "CVE-2024-21068", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21068" }, { "cve": "CVE-2024-21085", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21085" }, { "cve": "CVE-2024-21094", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21094" }, { "cve": "CVE-2024-22365", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-22365" }, { "cve": "CVE-2024-24783", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-24783" }, { "cve": "CVE-2024-24784", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-24784" }, { "cve": "CVE-2024-24785", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-24785" }, { "cve": "CVE-2024-24786", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-24786" }, { "cve": "CVE-2024-25062", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25742", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-25742" }, { "cve": "CVE-2024-25743", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-25743" }, { "cve": "CVE-2024-26582", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26582" }, { "cve": "CVE-2024-26583", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26583" }, { "cve": "CVE-2024-26584", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26584" }, { "cve": "CVE-2024-26585", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26585" }, { "cve": "CVE-2024-26586", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26586" }, { "cve": "CVE-2024-26593", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26593" }, { "cve": "CVE-2024-26602", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26602" }, { "cve": "CVE-2024-26609", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26609" }, { "cve": "CVE-2024-26633", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26633" }, { "cve": "CVE-2024-27316", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-27316" }, { "cve": "CVE-2024-28834", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-28834" }, { "cve": "CVE-2024-28835", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-28835" }, { "cve": "CVE-2024-28849", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29180", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-29180" }, { "cve": "CVE-2024-2961", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-2961" }, { "cve": "CVE-2024-33599", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-33602" } ] }
wid-sec-w-2024-1226
Vulnerability from csaf_certbund
Published
2024-05-22 22:00
Modified
2024-06-13 22:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern oder um weitere nicht spezifizierte Angriffe auszuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1226 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1226.json" }, { "category": "self", "summary": "WID-SEC-2024-1226 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1226" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2874 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2874" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2929 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2929" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2930 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2930" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2932 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2932" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2933 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2933" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2874 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3316" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2901 vom 2024-05-23", "url": "https://access.redhat.com/errata/RHSA-2024:2901" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3473 vom 2024-05-29", "url": "https://access.redhat.com/errata/RHSA-2024:3473" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3790 vom 2024-06-11", "url": "https://access.redhat.com/errata/RHSA-2024:3790" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3715 vom 2024-06-12", "url": "https://access.redhat.com/errata/RHSA-2024:3715" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3314 vom 2024-06-13", "url": "https://access.redhat.com/errata/RHSA-2024:3314" }, { "category": "external", "summary": "RedHat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2024:3919" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-13T22:00:00.000+00:00", "generator": { "date": "2024-06-14T08:08:23.564+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1226", "initial_release_date": "2024-05-22T22:00:00.000+00:00", "revision_history": [ { "date": "2024-05-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-05-23T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-13T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "T035142", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T035034", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version_range", "name": "Migration Toolkit for Applications \u003c7.0.3", "product": { "name": "Red Hat OpenShift Migration Toolkit for Applications \u003c7.0.3", "product_id": "T035036", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:migration_toolkit_for_applications__7.0.3" } } }, { "category": "product_version", "name": "Custom Metric Autoscaler 2", "product": { "name": "Red Hat OpenShift Custom Metric Autoscaler 2", "product_id": "T035047", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:custom_metric_autoscaler_2" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-26555", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2020-26555" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-29390", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2021-29390" }, { "cve": "CVE-2021-43618", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2021-43618" }, { "cve": "CVE-2022-0480", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-0480" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-40090", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-40090" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-48554", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-48554" }, { "cve": "CVE-2022-48624", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2022-48624" }, { "cve": "CVE-2023-24023", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-24023" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25775", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-25775" }, { "cve": "CVE-2023-26159", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-26159" }, { "cve": "CVE-2023-26364", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-26364" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28866", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-28866" }, { "cve": "CVE-2023-2975", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-2975" }, { "cve": "CVE-2023-31083", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-31083" }, { "cve": "CVE-2023-31122", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-31122" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3567", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-3567" }, { "cve": "CVE-2023-3618", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-3618" }, { "cve": "CVE-2023-37453", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-37453" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-38469", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38469" }, { "cve": "CVE-2023-38470", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38470" }, { "cve": "CVE-2023-38471", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38471" }, { "cve": "CVE-2023-38472", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38472" }, { "cve": "CVE-2023-38473", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38473" }, { "cve": "CVE-2023-38546", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-38546" }, { "cve": "CVE-2023-39189", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39189" }, { "cve": "CVE-2023-39193", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39193" }, { "cve": "CVE-2023-39194", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39194" }, { "cve": "CVE-2023-39198", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39198" }, { "cve": "CVE-2023-39326", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-39326" }, { "cve": "CVE-2023-40745", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-40745" }, { "cve": "CVE-2023-41175", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-41175" }, { "cve": "CVE-2023-4133", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-4133" }, { "cve": "CVE-2023-42754", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42756", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-42756" }, { "cve": "CVE-2023-43785", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43785" }, { "cve": "CVE-2023-43786", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43786" }, { "cve": "CVE-2023-43787", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43787" }, { "cve": "CVE-2023-43788", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43788" }, { "cve": "CVE-2023-43789", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-43789" }, { "cve": "CVE-2023-4408", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-4408" }, { "cve": "CVE-2023-45286", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45286" }, { "cve": "CVE-2023-45287", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45287" }, { "cve": "CVE-2023-45288", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45288" }, { "cve": "CVE-2023-45289", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45289" }, { "cve": "CVE-2023-45290", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45290" }, { "cve": "CVE-2023-45857", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45857" }, { "cve": "CVE-2023-45863", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-45863" }, { "cve": "CVE-2023-46218", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46862", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-46862" }, { "cve": "CVE-2023-47038", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-47038" }, { "cve": "CVE-2023-48631", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-48631" }, { "cve": "CVE-2023-50387", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-50387" }, { "cve": "CVE-2023-50868", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-50868" }, { "cve": "CVE-2023-51043", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-51043" }, { "cve": "CVE-2023-51779", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-51779" }, { "cve": "CVE-2023-51780", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-51780" }, { "cve": "CVE-2023-52425", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52434", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52434" }, { "cve": "CVE-2023-52448", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52448" }, { "cve": "CVE-2023-52476", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52476" }, { "cve": "CVE-2023-52489", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52489" }, { "cve": "CVE-2023-52522", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52522" }, { "cve": "CVE-2023-52529", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52529" }, { "cve": "CVE-2023-52574", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52574" }, { "cve": "CVE-2023-52578", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52578" }, { "cve": "CVE-2023-52580", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52580" }, { "cve": "CVE-2023-52581", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52581" }, { "cve": "CVE-2023-52597", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52597" }, { "cve": "CVE-2023-52610", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52610" }, { "cve": "CVE-2023-52620", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-52620" }, { "cve": "CVE-2023-5678", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-5678" }, { "cve": "CVE-2023-6040", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6040" }, { "cve": "CVE-2023-6121", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6121" }, { "cve": "CVE-2023-6129", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6129" }, { "cve": "CVE-2023-6176", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6176" }, { "cve": "CVE-2023-6228", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6228" }, { "cve": "CVE-2023-6237", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6237" }, { "cve": "CVE-2023-6240", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6240" }, { "cve": "CVE-2023-6531", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6531" }, { "cve": "CVE-2023-6546", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6546" }, { "cve": "CVE-2023-6622", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6622" }, { "cve": "CVE-2023-6915", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6915" }, { "cve": "CVE-2023-6931", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6931" }, { "cve": "CVE-2023-6932", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-6932" }, { "cve": "CVE-2023-7008", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2023-7008" }, { "cve": "CVE-2024-0565", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-0565" }, { "cve": "CVE-2024-0727", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-0727" }, { "cve": "CVE-2024-0841", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-0841" }, { "cve": "CVE-2024-1085", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-1085" }, { "cve": "CVE-2024-1086", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-1086" }, { "cve": "CVE-2024-1394", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-1394" }, { "cve": "CVE-2024-1488", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-1488" }, { "cve": "CVE-2024-21011", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21011" }, { "cve": "CVE-2024-21012", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21012" }, { "cve": "CVE-2024-21068", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21068" }, { "cve": "CVE-2024-21085", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21085" }, { "cve": "CVE-2024-21094", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-21094" }, { "cve": "CVE-2024-22365", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-22365" }, { "cve": "CVE-2024-24783", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-24783" }, { "cve": "CVE-2024-24784", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-24784" }, { "cve": "CVE-2024-24785", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-24785" }, { "cve": "CVE-2024-24786", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-24786" }, { "cve": "CVE-2024-25062", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25742", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-25742" }, { "cve": "CVE-2024-25743", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-25743" }, { "cve": "CVE-2024-26582", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26582" }, { "cve": "CVE-2024-26583", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26583" }, { "cve": "CVE-2024-26584", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26584" }, { "cve": "CVE-2024-26585", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26585" }, { "cve": "CVE-2024-26586", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26586" }, { "cve": "CVE-2024-26593", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26593" }, { "cve": "CVE-2024-26602", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26602" }, { "cve": "CVE-2024-26609", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26609" }, { "cve": "CVE-2024-26633", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-26633" }, { "cve": "CVE-2024-27316", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-27316" }, { "cve": "CVE-2024-28834", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-28834" }, { "cve": "CVE-2024-28835", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-28835" }, { "cve": "CVE-2024-28849", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29180", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-29180" }, { "cve": "CVE-2024-2961", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-2961" }, { "cve": "CVE-2024-33599", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "notes": [ { "category": "description", "text": "In Red Hat OpenShift bestehen mehrere Schwachstellen. Diese Schwachstellen bestehen in mehreren Komponenten und Subsystemen wie Oracle Java, dem Linux-Kernel oder dem HTTP/2-Protokoll in der Programmiersprache Go und in der Migration Toolkit Komponente aufgrund mehrerer sicherheitsrelevanter Probleme wie einer Race Condition, einer NULL- Pointer-Dereferenz oder einem Memory Allocation-Problem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T035034", "T035142", "T035047" ] }, "release_date": "2024-05-22T22:00:00Z", "title": "CVE-2024-33602" } ] }
WID-SEC-W-2024-0588
Vulnerability from csaf_certbund
Published
2024-03-07 23:00
Modified
2024-03-07 23:00
Summary
IBM App Connect Enterprise: Schwachstelle ermöglicht Cross-Site Request Forgery
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM App Connect Enterprise kombiniert die branchenbewährten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM App Connect Enterprise ausnutzen, um Cross-Site-Scripting-Angriffe, Web-Cache-Poisoning und andere bösartige Aktivitäten durchzuführen
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM App Connect Enterprise kombiniert die branchenbew\u00e4hrten Technologien des IBM Integration Bus mit Cloud-nativen Technologien.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM App Connect Enterprise ausnutzen, um Cross-Site-Scripting-Angriffe, Web-Cache-Poisoning und andere b\u00f6sartige Aktivit\u00e4ten durchzuf\u00fchren", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0588 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0588.json" }, { "category": "self", "summary": "WID-SEC-2024-0588 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0588" }, { "category": "external", "summary": "IBM Security Bulletin 7130998 vom 2024-03-07", "url": "https://www.ibm.com/support/pages/node/7130998" } ], "source_lang": "en-US", "title": "IBM App Connect Enterprise: Schwachstelle erm\u00f6glicht Cross-Site Request Forgery", "tracking": { "current_release_date": "2024-03-07T23:00:00.000+00:00", "generator": { "date": "2024-03-08T12:35:54.510+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0588", "initial_release_date": "2024-03-07T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-07T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "12.0.1.0 - 12.0.10.0", "product": { "name": "IBM App Connect Enterprise 12.0.1.0 - 12.0.10.0", "product_id": "T032246", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.10.0" } } }, { "category": "product_version", "name": "11.0.0.1 - 11.0.0.23", "product": { "name": "IBM App Connect Enterprise 11.0.0.1 - 11.0.0.23", "product_id": "T032247", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:11.0.0.1_-_11.0.0.23" } } } ], "category": "product_name", "name": "App Connect Enterprise" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "notes": [ { "category": "description", "text": "In IBM App Connect Enterprise existiert eine Schwachstelle in der Axios Komponente. Benutzereingaben werden nur ungen\u00fcgend validiert, wodurch ein Cross-Site Request Forgery m\u00f6glich wird. Ein entfernter, anonymer Angreifer kann unter bestimmten Umst\u00e4nden durch das Einf\u00fcgen des X-XSRF-TOKEN-Headers mit einem geheimen XSRF-TOKEN-Cookie-Wert in Anfragen an einen beliebigen Server, Cross-Site-Scripting-Angriffe, Web-Cache-Poisoning und andere b\u00f6sartige Aktivit\u00e4ten durchf\u00fchren Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T032247", "T032246" ] }, "release_date": "2024-03-07T23:00:00Z", "title": "CVE-2023-45857" } ] }
WID-SEC-W-2024-0277
Vulnerability from csaf_certbund
Published
2024-02-01 23:00
Modified
2024-02-01 23:00
Summary
IBM Business Automation Workflow: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Business Automation Workflow ist eine Lösung zur Automatisierung von Arbeitsabläufen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um einen Cross-Site-Scripting-Angriff zu starten, einen Phishing-Angriff durchzuführen, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um einen Cross-Site-Scripting-Angriff zu starten, einen Phishing-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0277 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0277.json" }, { "category": "self", "summary": "WID-SEC-2024-0277 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0277" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-02-01", "url": "https://www.ibm.com/support/pages/node/7114422" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-02-01", "url": "https://www.ibm.com/support/pages/node/7114423" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-02-01", "url": "https://www.ibm.com/support/pages/node/7114425" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-01T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:59:00.312+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0277", "initial_release_date": "2024-02-01T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-01T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow \u003c 23.0.2-IF001", "product": { "name": "IBM Business Automation Workflow \u003c 23.0.2-IF001", "product_id": "T032483", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:23.0.2-if001" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow \u003c 21.0.3-IF029", "product": { "name": "IBM Business Automation Workflow \u003c 21.0.3-IF029", "product_id": "T032484", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:21.0.3-if029" } } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-45857", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-02-01T23:00:00Z", "title": "CVE-2023-45857" }, { "cve": "CVE-2023-26159", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2024-02-01T23:00:00Z", "title": "CVE-2023-26159" }, { "cve": "CVE-2023-31582", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Business Automation Workflow. Dieser Fehler besteht im Jose4J-Paket und wird dadurch verursacht, dass eine niedrige Iterationszahl von 1000 oder weniger zugelassen wird. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um gehashte Passwortwerte zu erhalten." } ], "release_date": "2024-02-01T23:00:00Z", "title": "CVE-2023-31582" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Business Automation Workflow. Dieser Fehler besteht in der Komponente snappy-java aufgrund einer fehlenden \u00dcberpr\u00fcfung der Obergrenze f\u00fcr die Chunk-L\u00e4nge. Durch das Senden einer speziell gestalteten Anfrage kann ein entfernter, anonymer Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-02-01T23:00:00Z", "title": "CVE-2023-43642" } ] }
ICSA-24-277-02
Vulnerability from csaf_cisa
Published
2024-10-01 06:00
Modified
2024-10-01 06:00
Summary
Subnet Solutions Inc. PowerSYSTEM Center
Notes
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could result in an attacker bypassing a proxy, creating a denial-of-service condition, or viewing sensitive information.
Critical infrastructure sectors
Critical Manufacturing, Energy
Countries/areas deployed
Worldwide
Company headquarters location
Canada
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:
Recommended Practices
Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolating them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Recommended Practices
CISA also recommends users take the following measures to protect themselves from social engineering attacks:
Recommended Practices
Do not click web links or open attachments in unsolicited email messages.
Recommended Practices
Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.
Recommended Practices
Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.
Recommended Practices
No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
{ "document": { "acknowledgments": [ { "organization": "Subnet Solutions Inc", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in an attacker bypassing a proxy, creating a denial-of-service condition, or viewing sensitive information.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Canada", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-24-277-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-277-02.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-24-277-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-277-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Subnet Solutions Inc. PowerSYSTEM Center", "tracking": { "current_release_date": "2024-10-01T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-277-02", "initial_release_date": "2024-10-01T06:00:00.000000Z", "revision_history": [ { "date": "2024-10-01T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=PSC_2020_v5.21.x", "product": { "name": "Subnet Solutions Inc. PowerSYSTEM Center: \u003c=PSC_2020_v5.21.x", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "PowerSYSTEM Center" } ], "category": "vendor", "name": "Subnet Solutions Inc." } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28168", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "summary", "text": "Vulnerable versions of PowerSYSTEM Center utilize Axios NPM package 0.21.0, which contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28168" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Subnet Solutions Inc. recommends users update to PowerSYSTEM Center 2020 Update 22, which can be located in the PowerSYSTEM Center by accessing Settings \u003e Overview \u003e Version. Users may also contact Subnet Solution\u0027s Customer Service", "product_ids": [ "CSAFPID-0001" ], "url": "https://subnet.com/contact/" }, { "category": "mitigation", "details": "Subnet Solutions Inc. strongly recommends users update to the latest version. If this is not possible, the following paragraphs describe the security control compensation(s), mitigation(s), or workaround(s) available for identified vulnerabilities:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For all vulnerabilities, users can disable usage of previous UI extensions.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For CVE-2020-28168 and CVE-2023-45857, users can limit outbound connection requests from the PowerSYSTEM Center security zone to external websites.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Vulnerable versions of PowerSYSTEM Center utilize Axios, which is vulnerable to Inefficient Regular Expression Complexity.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Subnet Solutions Inc. recommends users update to PowerSYSTEM Center 2020 Update 22, which can be located in the PowerSYSTEM Center by accessing Settings \u003e Overview \u003e Version. Users may also contact Subnet Solution\u0027s Customer Service", "product_ids": [ "CSAFPID-0001" ], "url": "https://subnet.com/contact/" }, { "category": "mitigation", "details": "Subnet Solutions Inc. strongly recommends users update to the latest version. If this is not possible, the following paragraphs describe the security control compensation(s), mitigation(s), or workaround(s) available for identified vulnerabilities:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For all vulnerabilities, users can disable usage of previous UI extensions.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For CVE-2023-45857 and CVE-2021-3749, users can disable PowerSYSTEM Center Client Access Server user\u0027s ability to access the browser\u0027s F12 Developer Tools to limit user ability to see HTTP headers and corresponding XSRF-TOKEN, and to manipulate requests to the PowerSYSTEM Center website.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "summary", "text": "Vulnerable versions of PowerSYSTEM Center utilize Axios 1.5.1, which can inadvertently reveal the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host, allowing attackers to view sensitive information.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Subnet Solutions Inc. recommends users update to PowerSYSTEM Center 2020 Update 22, which can be located in the PowerSYSTEM Center by accessing Settings \u003e Overview \u003e Version. Users may also contact Subnet Solution\u0027s Customer Service", "product_ids": [ "CSAFPID-0001" ], "url": "https://subnet.com/contact/" }, { "category": "mitigation", "details": "Subnet Solutions Inc. strongly recommends users update to the latest version. If this is not possible, the following paragraphs describe the security control compensation(s), mitigation(s), or workaround(s) available for identified vulnerabilities:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For all vulnerabilities, users can disable usage of previous UI extensions.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For CVE-2020-28168 and CVE-2023-45857, users can limit outbound connection requests from the PowerSYSTEM Center security zone to external websites.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For CVE-2023-45857 and CVE-2021-3749, users can disable PowerSYSTEM Center Client Access Server user\u0027s ability to access the browser\u0027s F12 Developer Tools to limit user ability to see HTTP headers and corresponding XSRF-TOKEN, and to manipulate requests to the PowerSYSTEM Center website.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }
icsa-24-277-02
Vulnerability from csaf_cisa
Published
2024-10-01 06:00
Modified
2024-10-01 06:00
Summary
Subnet Solutions Inc. PowerSYSTEM Center
Notes
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could result in an attacker bypassing a proxy, creating a denial-of-service condition, or viewing sensitive information.
Critical infrastructure sectors
Critical Manufacturing, Energy
Countries/areas deployed
Worldwide
Company headquarters location
Canada
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:
Recommended Practices
Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolating them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Recommended Practices
CISA also recommends users take the following measures to protect themselves from social engineering attacks:
Recommended Practices
Do not click web links or open attachments in unsolicited email messages.
Recommended Practices
Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.
Recommended Practices
Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.
Recommended Practices
No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
{ "document": { "acknowledgments": [ { "organization": "Subnet Solutions Inc", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in an attacker bypassing a proxy, creating a denial-of-service condition, or viewing sensitive information.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing, Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Canada", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-24-277-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-277-02.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-24-277-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-277-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Subnet Solutions Inc. PowerSYSTEM Center", "tracking": { "current_release_date": "2024-10-01T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-277-02", "initial_release_date": "2024-10-01T06:00:00.000000Z", "revision_history": [ { "date": "2024-10-01T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=PSC_2020_v5.21.x", "product": { "name": "Subnet Solutions Inc. PowerSYSTEM Center: \u003c=PSC_2020_v5.21.x", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "PowerSYSTEM Center" } ], "category": "vendor", "name": "Subnet Solutions Inc." } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28168", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "summary", "text": "Vulnerable versions of PowerSYSTEM Center utilize Axios NPM package 0.21.0, which contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28168" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Subnet Solutions Inc. recommends users update to PowerSYSTEM Center 2020 Update 22, which can be located in the PowerSYSTEM Center by accessing Settings \u003e Overview \u003e Version. Users may also contact Subnet Solution\u0027s Customer Service", "product_ids": [ "CSAFPID-0001" ], "url": "https://subnet.com/contact/" }, { "category": "mitigation", "details": "Subnet Solutions Inc. strongly recommends users update to the latest version. If this is not possible, the following paragraphs describe the security control compensation(s), mitigation(s), or workaround(s) available for identified vulnerabilities:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For all vulnerabilities, users can disable usage of previous UI extensions.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For CVE-2020-28168 and CVE-2023-45857, users can limit outbound connection requests from the PowerSYSTEM Center security zone to external websites.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Vulnerable versions of PowerSYSTEM Center utilize Axios, which is vulnerable to Inefficient Regular Expression Complexity.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Subnet Solutions Inc. recommends users update to PowerSYSTEM Center 2020 Update 22, which can be located in the PowerSYSTEM Center by accessing Settings \u003e Overview \u003e Version. Users may also contact Subnet Solution\u0027s Customer Service", "product_ids": [ "CSAFPID-0001" ], "url": "https://subnet.com/contact/" }, { "category": "mitigation", "details": "Subnet Solutions Inc. strongly recommends users update to the latest version. If this is not possible, the following paragraphs describe the security control compensation(s), mitigation(s), or workaround(s) available for identified vulnerabilities:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For all vulnerabilities, users can disable usage of previous UI extensions.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For CVE-2023-45857 and CVE-2021-3749, users can disable PowerSYSTEM Center Client Access Server user\u0027s ability to access the browser\u0027s F12 Developer Tools to limit user ability to see HTTP headers and corresponding XSRF-TOKEN, and to manipulate requests to the PowerSYSTEM Center website.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2023-45857", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "summary", "text": "Vulnerable versions of PowerSYSTEM Center utilize Axios 1.5.1, which can inadvertently reveal the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host, allowing attackers to view sensitive information.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45857" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Subnet Solutions Inc. recommends users update to PowerSYSTEM Center 2020 Update 22, which can be located in the PowerSYSTEM Center by accessing Settings \u003e Overview \u003e Version. Users may also contact Subnet Solution\u0027s Customer Service", "product_ids": [ "CSAFPID-0001" ], "url": "https://subnet.com/contact/" }, { "category": "mitigation", "details": "Subnet Solutions Inc. strongly recommends users update to the latest version. If this is not possible, the following paragraphs describe the security control compensation(s), mitigation(s), or workaround(s) available for identified vulnerabilities:", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "For all vulnerabilities, users can disable usage of previous UI extensions.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For CVE-2020-28168 and CVE-2023-45857, users can limit outbound connection requests from the PowerSYSTEM Center security zone to external websites.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "For CVE-2023-45857 and CVE-2021-3749, users can disable PowerSYSTEM Center Client Access Server user\u0027s ability to access the browser\u0027s F12 Developer Tools to limit user ability to see HTTP headers and corresponding XSRF-TOKEN, and to manipulate requests to the PowerSYSTEM Center website.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }
gsd-2023-45857
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-45857", "id": "GSD-2023-45857" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-45857" ], "details": "An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.", "id": "GSD-2023-45857", "modified": "2023-12-13T01:20:38.225574Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2023-45857", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/axios/axios/issues/6006", "refsource": "MISC", "url": "https://github.com/axios/axios/issues/6006" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:axios:axios:1.5.1:*:*:*:*:node.js:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2023-45857" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-352" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/axios/axios/issues/6006", "refsource": "", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axios/axios/issues/6006" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2023-11-16T17:35Z", "publishedDate": "2023-11-08T21:15Z" } } }
ghsa-wf5p-g6vw-rhxx
Vulnerability from github
Published
2023-11-08 21:30
Modified
2024-06-21 21:33
Severity ?
Summary
Axios Cross-Site Request Forgery Vulnerability
Details
An issue discovered in Axios 0.8.1 through 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "axios" }, "ranges": [ { "events": [ { "introduced": "1.0.0" }, { "fixed": "1.6.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "axios" }, "ranges": [ { "events": [ { "introduced": "0.8.1" }, { "fixed": "0.28.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-45857" ], "database_specific": { "cwe_ids": [ "CWE-352" ], "github_reviewed": true, "github_reviewed_at": "2023-11-10T00:35:37Z", "nvd_published_at": "2023-11-08T21:15:08Z", "severity": "MODERATE" }, "details": "An issue discovered in Axios 0.8.1 through 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.", "id": "GHSA-wf5p-g6vw-rhxx", "modified": "2024-06-21T21:33:58Z", "published": "2023-11-08T21:30:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45857" }, { "type": "WEB", "url": "https://github.com/axios/axios/issues/6006" }, { "type": "WEB", "url": "https://github.com/axios/axios/issues/6022" }, { "type": "WEB", "url": "https://github.com/axios/axios/pull/6028" }, { "type": "WEB", "url": "https://github.com/axios/axios/pull/6091" }, { "type": "WEB", "url": "https://github.com/axios/axios/commit/2755df562b9c194fba6d8b609a383443f6a6e967" }, { "type": "WEB", "url": "https://github.com/axios/axios/commit/96ee232bd3ee4de2e657333d4d2191cd389e14d0" }, { "type": "PACKAGE", "url": "https://github.com/axios/axios" }, { "type": "WEB", "url": "https://github.com/axios/axios/releases/tag/v0.28.0" }, { "type": "WEB", "url": "https://github.com/axios/axios/releases/tag/v1.6.0" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-JS-AXIOS-6032459" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Axios Cross-Site Request Forgery Vulnerability" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.