rhba-2023_6109
Vulnerability from csaf_redhat
Published
2023-10-25 12:32
Modified
2024-11-15 19:53
Summary
Red Hat Bug Fix Advisory: MTV 2.4.3 Images

Notes

Topic
Updated Release packages that fix several bugs and add various enhancements are now available.
Details
Migration Toolkit for Virtualization 2.4.3 Images
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated Release packages that fix several bugs and add various enhancements are now available.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Migration Toolkit for Virtualization 2.4.3 Images",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2023:6109",
        "url": "https://access.redhat.com/errata/RHBA-2023:6109"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhba-2023_6109.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: MTV 2.4.3 Images",
    "tracking": {
      "current_release_date": "2024-11-15T19:53:32+00:00",
      "generator": {
        "date": "2024-11-15T19:53:32+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHBA-2023:6109",
      "initial_release_date": "2023-10-25T12:32:35+00:00",
      "revision_history": [
        {
          "date": "2023-10-25T12:32:35+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2023-10-25T12:32:35+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T19:53:32+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "8Base-MTV-2.4",
                "product": {
                  "name": "8Base-MTV-2.4",
                  "product_id": "9Base-MTV-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:migration_toolkit_virtualization:2.4::el9"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "8Base-MTV-2.4",
                "product": {
                  "name": "8Base-MTV-2.4",
                  "product_id": "8Base-MTV-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:migration_toolkit_virtualization:2.4::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Migration Toolkit for Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-api-rhel9\u0026tag=2.4.3-5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-console-plugin-rhel9\u0026tag=2.4.3-3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-controller-rhel9\u0026tag=2.4.3-5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-must-gather-api-rhel8\u0026tag=2.4.3-5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-must-gather-rhel8\u0026tag=2.4.3-6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-openstack-populator-rhel9\u0026tag=2.4.3-5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-operator-bundle\u0026tag=2.4.3-12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-rhel8-operator\u0026tag=2.4.3-3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-populator-controller-rhel9\u0026tag=2.4.3-5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-rhv-populator-rhel8\u0026tag=2.4.3-4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-ui-rhel8\u0026tag=2.4.3-2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-validation-rhel9\u0026tag=2.4.3-5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-virt-v2v-rhel9\u0026tag=2.4.3-4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
                "product": {
                  "name": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
                  "product_id": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c?arch=amd64\u0026repository_url=registry.redhat.io/migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8\u0026tag=2.4.3-3"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
        "relates_to_product_reference": "8Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
        "relates_to_product_reference": "8Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
        "relates_to_product_reference": "8Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
        "relates_to_product_reference": "8Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
        "relates_to_product_reference": "8Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
        "relates_to_product_reference": "8Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
        "relates_to_product_reference": "9Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
        "relates_to_product_reference": "9Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
        "relates_to_product_reference": "9Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
        "relates_to_product_reference": "9Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
        "relates_to_product_reference": "9Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
        "relates_to_product_reference": "9Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
        "relates_to_product_reference": "9Base-MTV-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64 as a component of 8Base-MTV-2.4",
          "product_id": "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        },
        "product_reference": "migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64",
        "relates_to_product_reference": "9Base-MTV-2.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-32190",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "discovery_date": "2022-09-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2124668"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/url: JoinPath does not strip relative path components in all circumstances",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-32190"
        },
        {
          "category": "external",
          "summary": "RHBZ#2124668",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-32190"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/54385",
          "url": "https://go.dev/issue/54385"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ",
          "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ"
        }
      ],
      "release_date": "2022-09-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: net/url: JoinPath does not strip relative path components in all circumstances"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Philippe Antoine"
          ],
          "organization": "Catena Cyber"
        }
      ],
      "cve": "CVE-2022-41723",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-03-14T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2178358"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41723"
        },
        {
          "category": "external",
          "summary": "RHBZ#2178358",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h",
          "url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/468135",
          "url": "https://go.dev/cl/468135"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/468295",
          "url": "https://go.dev/cl/468295"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/57855",
          "url": "https://go.dev/issue/57855"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E",
          "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1571",
          "url": "https://pkg.go.dev/vuln/GO-2023-1571"
        },
        {
          "category": "external",
          "summary": "https://vuln.go.dev/ID/GO-2023-1571.json",
          "url": "https://vuln.go.dev/ID/GO-2023-1571.json"
        }
      ],
      "release_date": "2023-02-17T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding"
    },
    {
      "cve": "CVE-2022-41724",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-03-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2178492"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: crypto/tls: large handshake records may cause panics",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The opportunity for a denial of service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41724"
        },
        {
          "category": "external",
          "summary": "RHBZ#2178492",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41724",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/468125",
          "url": "https://go.dev/cl/468125"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/58001",
          "url": "https://go.dev/issue/58001"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E",
          "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1570",
          "url": "https://pkg.go.dev/vuln/GO-2023-1570"
        }
      ],
      "release_date": "2023-02-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: crypto/tls: large handshake records may cause panics"
    },
    {
      "cve": "CVE-2022-41725",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-03-15T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2178488"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, mime/multipart: denial of service from excessive resource consumption",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-41725"
        },
        {
          "category": "external",
          "summary": "RHBZ#2178488",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41725",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/468124",
          "url": "https://go.dev/cl/468124"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/58006",
          "url": "https://go.dev/issue/58006"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E",
          "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1569",
          "url": "https://pkg.go.dev/vuln/GO-2023-1569"
        }
      ],
      "release_date": "2023-02-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: net/http, mime/multipart: denial of service from excessive resource consumption"
    },
    {
      "cve": "CVE-2023-3978",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2023-08-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2228689"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Golang HTML package where it is vulnerable to Cross-site scripting caused by the improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim\u0027s web browser within the security context of the hosting website once the URL is clicked. The flaw allows an attacker to steal the victim\u0027s cookie-based authentication credentials.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang.org/x/net/html: Cross site scripting",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-3978"
        },
        {
          "category": "external",
          "summary": "RHBZ#2228689",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228689"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3978",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3978",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3978"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/514896",
          "url": "https://go.dev/cl/514896"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/61615",
          "url": "https://go.dev/issue/61615"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1988",
          "url": "https://pkg.go.dev/vuln/GO-2023-1988"
        }
      ],
      "release_date": "2023-08-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang.org/x/net/html: Cross site scripting"
    },
    {
      "cve": "CVE-2023-24534",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-04-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2184483"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, net/textproto: denial of service from excessive memory allocation",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24534"
        },
        {
          "category": "external",
          "summary": "RHBZ#2184483",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24534",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/58975",
          "url": "https://go.dev/issue/58975"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8",
          "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
        }
      ],
      "release_date": "2023-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: net/http, net/textproto: denial of service from excessive memory allocation"
    },
    {
      "cve": "CVE-2023-24536",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-04-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2184482"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses Go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not-affected.\n* The CVE refers to multipart form parsing routine mime/multipart.Reader.ReadForm, which is not used in Grafana, hence it is not-affected.\n* Butane does not parse multipart forms, hence, it is also not-affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24536"
        },
        {
          "category": "external",
          "summary": "RHBZ#2184482",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/59153",
          "url": "https://go.dev/issue/59153"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8",
          "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
        }
      ],
      "release_date": "2023-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption"
    },
    {
      "cve": "CVE-2023-24537",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2023-04-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2184484"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: go/parser: Infinite loop in parsing",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24537"
        },
        {
          "category": "external",
          "summary": "RHBZ#2184484",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/go/issues/59180",
          "url": "https://github.com/golang/go/issues/59180"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8",
          "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
        }
      ],
      "release_date": "2023-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: go/parser: Infinite loop in parsing"
    },
    {
      "cve": "CVE-2023-24538",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2023-04-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2184481"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: html/template: backticks not treated as string delimiters",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The described issue involving Go templates and JavaScript template literals poses a moderate severity rather than an important one due to several mitigating factors. Firstly, the vulnerability requires specific conditions to be met: the presence of Go templates within JavaScript template literals. This limits the scope of affected codebases, reducing the likelihood of exploitation. Additionally, the decision to disallow such interactions in future releases of Go indicates a proactive approach to addressing the issue. Furthermore, the affected packages or components within Red Hat Enterprise Linux, such as Conmon, Grafana, and the RHC package, have been assessed and determined not to be impacted due to their specific usage patterns. So the limited scope of affected systems and the absence of exploitation vectors in specific components within Red Hat Enterprise Linux contribute to categorizing the severity of the issue as moderate.\n\nFor Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* The rhc package do not make use of html/template. Hence, it is also not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24538"
        },
        {
          "category": "external",
          "summary": "RHBZ#2184481",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/go/issues/59234",
          "url": "https://github.com/golang/go/issues/59234"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8",
          "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
        }
      ],
      "release_date": "2023-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: html/template: backticks not treated as string delimiters"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Juho Nurminen"
          ],
          "organization": "Mattermost"
        }
      ],
      "cve": "CVE-2023-24539",
      "cwe": {
        "id": "CWE-176",
        "name": "Improper Handling of Unicode Encoding"
      },
      "discovery_date": "2023-05-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2196026"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a \u0027/\u0027 character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: html/template: improper sanitization of CSS values",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore, the impact is low.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-24539"
        },
        {
          "category": "external",
          "summary": "RHBZ#2196026",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24539",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539"
        },
        {
          "category": "external",
          "summary": "https://github.com/golang/go/issues/59720",
          "url": "https://github.com/golang/go/issues/59720"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU",
          "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"
        }
      ],
      "release_date": "2023-04-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: html/template: improper sanitization of CSS values"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Juho Nurminen"
          ],
          "organization": "Mattermost"
        }
      ],
      "cve": "CVE-2023-29400",
      "cwe": {
        "id": "CWE-176",
        "name": "Improper Handling of Unicode Encoding"
      },
      "discovery_date": "2023-05-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2196029"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \"attr={{.}}\") executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: html/template: improper handling of empty HTML attributes",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn OpenShift Container Platform and Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users, reducing the impact to low.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-29400"
        },
        {
          "category": "external",
          "summary": "RHBZ#2196029",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29400",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/59722",
          "url": "https://go.dev/issue/59722"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU",
          "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"
        }
      ],
      "release_date": "2023-04-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: html/template: improper handling of empty HTML attributes"
    },
    {
      "cve": "CVE-2023-29409",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-08-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2228743"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-29409"
        },
        {
          "category": "external",
          "summary": "RHBZ#2228743",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29409",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/515257",
          "url": "https://go.dev/cl/515257"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/61460",
          "url": "https://go.dev/issue/61460"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ",
          "url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-1987",
          "url": "https://pkg.go.dev/vuln/GO-2023-1987"
        }
      ],
      "release_date": "2023-08-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys"
    },
    {
      "cve": "CVE-2023-39325",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2243296"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "RHBZ#2243296",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
          "url": "https://access.redhat.com/security/cve/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/63417",
          "url": "https://go.dev/issue/63417"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-2102",
          "url": "https://pkg.go.dev/vuln/GO-2023-2102"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
          "url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
        }
      ],
      "release_date": "2023-10-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        },
        {
          "category": "workaround",
          "details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2023-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2242803"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64"
        ],
        "known_not_affected": [
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
          "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
          "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "RHBZ#2242803",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
        },
        {
          "category": "external",
          "summary": "RHSB-2023-003",
          "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://github.com/dotnet/announcements/issues/277",
          "url": "https://github.com/dotnet/announcements/issues/277"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2023-2102",
          "url": "https://pkg.go.dev/vuln/GO-2023-2102"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
          "url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
        },
        {
          "category": "external",
          "summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
          "url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2023-10-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2023-10-25T12:32:35+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\n        https://access.redhat.com/articles/11258",
          "product_ids": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2023:6109"
        },
        {
          "category": "workaround",
          "details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n     a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n     b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n     c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n     d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n     e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
          "product_ids": [
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-api-rhel8@sha256:afc08bab3b5b19bcd4003819d4e1bc1c9c3faf71370154ee1695c9a3a6192223_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-must-gather-rhel8@sha256:0b766d8e51580920d3b558eaac237b39b70f890127adaac34177aff1b97596fa_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhel8-operator@sha256:30cea757cbe41f54ecfd59320ea92351e1209f5646c7346d7d7563e383e988bb_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-rhv-populator-rhel8@sha256:f1c946eb52c6464db8a68cd4c6b61b6df145c68aef4a4858651076ba27d5c40b_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-ui-rhel8@sha256:f872479bcfbf35cae89eb3c95005067b8e64aca090cc058c4e4a1f0db56df9ff_amd64",
            "8Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8@sha256:c8a7ee4f36ffc0206d614ad47ce95a13aacdf80a47e1ea7209e0f9824914c36c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-controller-rhel9@sha256:c9b7db0c74e38e5f028b3b72066892c96b6f684575d395a197a0826c09d96e1d_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-openstack-populator-rhel9@sha256:cb8d1bc7320c4ba9caa1d3bb45e48c6d1d2b71799f5dc466c5de8b87579d0c63_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-operator-bundle@sha256:f3172be67364c2a3a5acc25976759e91643c30dfa4d034ea39884ce2be084741_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-populator-controller-rhel9@sha256:4bbec09dfd8021e9cf676f1fb85a0a3f168845b91421afa5ded7983a3561d301_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-validation-rhel9@sha256:8d9947ca76642dacb58290203f5ad003f7ca4f1a5a075ac584ab9e27018a0eed_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-virt-v2v-rhel9@sha256:7ecf4ffb01ccf2cd92fa96407bca9e5b6054e3b5033ada74c98e00dca163d1f7_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-api-rhel9@sha256:61de05b8dffe208fb8d4c00aed8bba71a4e428f74cc06b936debfbe4fb640747_amd64",
            "9Base-MTV-2.4:migration-toolkit-virtualization/mtv-console-plugin-rhel9@sha256:3022d96f38b8900d1b545cbf045f96816194bfba917f08c2e67758f7928acf2c_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2023-10-10T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.