rhsa-2021_2179
Vulnerability from csaf_redhat
Published
2021-06-01 13:24
Modified
2024-11-05 23:37
Summary
Red Hat Security Advisory: RHV Manager security update (ovirt-engine) [ovirt-4.4.6]
Notes
Topic
Updated ovirt-engine packages that fix several bugs , security flaws and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The ovirt-engine package provides the manager for virtualization environments.
This manager enables admins to define hosts and networks, as well as to add
storage, create VMs and manage user permissions.
A list of bugs fixed in this update is available in the Technical Notes
book:
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes
Security Fix(es):
* nodejs-lodash: command injection via template (CVE-2021-23337)
* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* This release adds the queue attribute to the virtio-scsi driver in the virtual machine configuration. This improvement enables multi-queue performance with the virtio-scsi driver. (BZ#911394)
* With this release, source-load-balancing has been added as a new sub-option for xmit_hash_policy. It can be configured for bond modes balance-xor (2), 802.3ad (4) and balance-tlb (5), by specifying xmit_hash_policy=vlan+srcmac. (BZ#1683987)
* The default DataCenter/Cluster will be set to compatibility level 4.6 on new installations of Red Hat Virtualization 4.4.6.; (BZ#1950348)
* With this release, support has been added for copying disks between regular Storage Domains and Managed Block Storage Domains.
It is now possible to migrate disks between Managed Block Storage Domains and regular Storage Domains. (BZ#1906074)
* Previously, the engine-config value LiveSnapshotPerformFreezeInEngine was set by default to false and was supposed to be uses in cluster compatibility levels below 4.4. The value was set to general version.
With this release, each cluster level has it's own value, defaulting to false for 4.4 and above. This will reduce unnecessary overhead in removing time outs of the file system freeze command. (BZ#1932284)
* With this release, running virtual machines is supported for up to 16TB of RAM on x86_64 architectures. (BZ#1944723)
* This release adds the gathering of oVirt/RHV related certificates to allow easier debugging of issues for faster customer help and issue resolution.
Information from certificates is now included as part of the sosreport. Note that no corresponding private key information is gathered, due to security considerations. (BZ#1845877)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ovirt-engine packages that fix several bugs , security flaws and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-engine package provides the manager for virtualization environments.\nThis manager enables admins to define hosts and networks, as well as to add\nstorage, create VMs and manage user permissions.\n\nA list of bugs fixed in this update is available in the Technical Notes\nbook:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes\n\nSecurity Fix(es):\n\n* nodejs-lodash: command injection via template (CVE-2021-23337)\n\n* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* This release adds the queue attribute to the virtio-scsi driver in the virtual machine configuration. This improvement enables multi-queue performance with the virtio-scsi driver. (BZ#911394)\n\n* With this release, source-load-balancing has been added as a new sub-option for xmit_hash_policy. It can be configured for bond modes balance-xor (2), 802.3ad (4) and balance-tlb (5), by specifying xmit_hash_policy=vlan+srcmac. (BZ#1683987)\n\n* The default DataCenter/Cluster will be set to compatibility level 4.6 on new installations of Red Hat Virtualization 4.4.6.; (BZ#1950348)\n\n* With this release, support has been added for copying disks between regular Storage Domains and Managed Block Storage Domains.\nIt is now possible to migrate disks between Managed Block Storage Domains and regular Storage Domains. (BZ#1906074)\n\n* Previously, the engine-config value LiveSnapshotPerformFreezeInEngine was set by default to false and was supposed to be uses in cluster compatibility levels below 4.4. The value was set to general version. \nWith this release, each cluster level has it\u0027s own value, defaulting to false for 4.4 and above. This will reduce unnecessary overhead in removing time outs of the file system freeze command. (BZ#1932284)\n\n* With this release, running virtual machines is supported for up to 16TB of RAM on x86_64 architectures. (BZ#1944723)\n\n* This release adds the gathering of oVirt/RHV related certificates to allow easier debugging of issues for faster customer help and issue resolution.\nInformation from certificates is now included as part of the sosreport. Note that no corresponding private key information is gathered, due to security considerations. (BZ#1845877)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2179", "url": "https://access.redhat.com/errata/RHSA-2021:2179" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes", "url": "https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes" }, { "category": "external", "summary": "1113630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113630" }, { "category": "external", "summary": "1310330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310330" }, { "category": "external", "summary": "1589763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589763" }, { "category": "external", "summary": "1621421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1621421" }, { "category": "external", "summary": "1717411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717411" }, { "category": "external", "summary": "1766414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766414" }, { "category": "external", "summary": "1775145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775145" }, { "category": "external", "summary": "1821199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821199" }, { "category": "external", "summary": "1845877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845877" }, { "category": "external", "summary": "1875363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875363" }, { "category": "external", "summary": "1906074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906074" }, { "category": "external", "summary": "1910858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910858" }, { "category": "external", "summary": "1917718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917718" }, { "category": "external", "summary": "1919195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919195" }, { "category": "external", "summary": "1919984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919984" }, { "category": "external", "summary": "1924610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924610" }, { "category": "external", "summary": "1926018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926018" }, { "category": "external", "summary": "1926823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926823" }, { "category": "external", "summary": "1928158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928158" }, { "category": "external", "summary": "1928188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928188" }, { "category": "external", "summary": "1928937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928937" }, { "category": "external", "summary": "1928954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928954" }, { "category": "external", "summary": "1929211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929211" }, { "category": "external", "summary": "1930522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930522" }, { "category": "external", "summary": "1930565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930565" }, { "category": "external", "summary": "1930895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930895" }, { "category": "external", "summary": "1932284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932284" }, { "category": "external", "summary": "1935073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935073" }, { "category": "external", "summary": "1942083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942083" }, { "category": "external", "summary": "1943267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943267" }, { "category": "external", "summary": "1944723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944723" }, { "category": "external", "summary": "1948577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948577" }, { "category": "external", "summary": "1949543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949543" }, { "category": "external", "summary": "1949547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949547" }, { "category": "external", "summary": "1950348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950348" }, { "category": "external", "summary": "1950466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950466" }, { "category": "external", "summary": "1954401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954401" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2179.json" } ], "title": "Red Hat Security Advisory: RHV Manager security update (ovirt-engine) [ovirt-4.4.6]", "tracking": { "current_release_date": "2024-11-05T23:37:43+00:00", "generator": { "date": "2024-11-05T23:37:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:2179", "initial_release_date": "2021-06-01T13:24:46+00:00", "revision_history": [ { "date": "2021-06-01T13:24:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-06-01T13:24:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T23:37:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product": { "name": "RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:4.4:el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.src", "product": { "name": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.src", "product_id": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-cockpit-sso@0.1.4-2.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src", "product": { "name": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src", "product_id": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.6.2-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src", "product": { "name": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src", "product_id": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhv-log-collector-analyzer@1.0.8-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "engine-db-query-0:1.6.3-1.el8ev.src", "product": { "name": "engine-db-query-0:1.6.3-1.el8ev.src", "product_id": "engine-db-query-0:1.6.3-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/engine-db-query@1.6.3-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "product": { "name": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "product_id": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.6-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.6.9-1.el8ev.src", "product": { "name": "ovirt-web-ui-0:1.6.9-1.el8ev.src", "product_id": "ovirt-web-ui-0:1.6.9-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.9-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "rhvm-branding-rhv-0:4.4.8-1.el8ev.src", "product": { "name": "rhvm-branding-rhv-0:4.4.8-1.el8ev.src", "product_id": "rhvm-branding-rhv-0:4.4.8-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm-branding-rhv@4.4.8-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-engine-0:4.4.6.6-0.10.el8ev.src", "product": { "name": "ovirt-engine-0:4.4.6.6-0.10.el8ev.src", "product_id": "ovirt-engine-0:4.4.6.6-0.10.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.4.6.6-0.10.el8ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch", "product": { "name": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch", "product_id": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-cockpit-sso@0.1.4-2.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh@4.4.6.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh-grafana-integration-setup@4.4.6.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch", "product": { "name": "ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch", "product_id": "ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dwh-setup@4.4.6.2-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch", "product": { "name": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch", "product_id": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhv-log-collector-analyzer@1.0.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "engine-db-query-0:1.6.3-1.el8ev.noarch", "product": { "name": "engine-db-query-0:1.6.3-1.el8ev.noarch", "product_id": "engine-db-query-0:1.6.3-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/engine-db-query@1.6.3-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "product": { "name": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "product_id": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-ui-extensions@1.2.6-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "product": { "name": "ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "product_id": "ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-web-ui@1.6.9-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch", "product": { "name": "rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch", "product_id": "rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm-branding-rhv@4.4.8-1.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-backend@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-cinderlib@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-imageio@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ovirt-engine-lib@4.4.6.6-0.10.el8ev?arch=noarch" } } }, { "category": "product_version", "name": "rhvm-0:4.4.6.6-0.10.el8ev.noarch", "product": { "name": "rhvm-0:4.4.6.6-0.10.el8ev.noarch", "product_id": "rhvm-0:4.4.6.6-0.10.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhvm@4.4.6.6-0.10.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "engine-db-query-0:1.6.3-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.noarch" }, "product_reference": "engine-db-query-0:1.6.3-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "engine-db-query-0:1.6.3-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.src" }, "product_reference": "engine-db-query-0:1.6.3-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch" }, "product_reference": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.src" }, "product_reference": "ovirt-cockpit-sso-0:0.1.4-2.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-0:4.4.6.6-0.10.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.src" }, "product_reference": "ovirt-engine-0:4.4.6.6-0.10.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src" }, "product_reference": "ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch" }, "product_reference": "ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch" }, "product_reference": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src" }, "product_reference": "ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.6.9-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.noarch" }, "product_reference": "ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-web-ui-0:1.6.9-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.src" }, "product_reference": "ovirt-web-ui-0:1.6.9-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch" }, "product_reference": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src" }, "product_reference": "rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-0:4.4.6.6-0.10.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhvm-0:4.4.6.6-0.10.el8ev.noarch" }, "product_reference": "rhvm-0:4.4.6.6-0.10.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch" }, "product_reference": "rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-S-4.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhvm-branding-rhv-0:4.4.8-1.el8ev.src as a component of RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4", "product_id": "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.src" }, "product_reference": "rhvm-branding-rhv-0:4.4.8-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-S-4.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28500", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.noarch", "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928954" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-lodash. A Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-lodash library to authenticated users only, therefore the impact is low.\n\nWhile Red Hat Virtualization\u0027s cockpit-ovirt has a dependency on lodash it doesn\u0027t use the vulnerable toNumber, trim, or trimEnd functions.\n\nWhile Red Hat Quay has a dependency on lodash via restangular it doesn\u0027t use the vulnerable toNumber, trim, or trimEnd functions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.noarch", "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28500" }, { "category": "external", "summary": "RHBZ#1928954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928954" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28500", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28500" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-LODASH-1018905", "url": "https://snyk.io/vuln/SNYK-JS-LODASH-1018905" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T13:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2179" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions" }, { "cve": "CVE-2021-23337", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2021-02-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.noarch", "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928937" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-lodash. A command injection flaw is possible through template variables.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-lodash: command injection via template", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable nodejs-lodash library to authenticated users only, therefore the impact is low.\n\nWhile Red Hat Virtualization\u0027s cockpit-ovirt has a dependency on lodash it doesn\u0027t use the vulnerable template function.\n\nWhile Red Hat Quay has a dependency on lodash via restangular it doesn\u0027t use the vulnerable template function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.src" ], "known_not_affected": [ "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.noarch", "8Base-RHV-S-4.4:engine-db-query-0:1.6.3-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-cockpit-sso-0:0.1.4-2.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-0:4.4.6.6-0.10.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-backend-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dbscripts-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-0:4.4.6.2-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-engine-dwh-grafana-integration-setup-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-dwh-setup-0:4.4.6.2-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-health-check-bundler-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-restapi-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-base-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-cinderlib-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-imageio-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-setup-plugin-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-tools-backup-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-vmconsole-proxy-helper-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-webadmin-portal-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-websocket-proxy-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:python3-ovirt-engine-lib-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.noarch", "8Base-RHV-S-4.4:rhv-log-collector-analyzer-0:1.0.8-1.el8ev.src", "8Base-RHV-S-4.4:rhvm-0:4.4.6.6-0.10.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.noarch", "8Base-RHV-S-4.4:rhvm-branding-rhv-0:4.4.8-1.el8ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23337" }, { "category": "external", "summary": "RHBZ#1928937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23337" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-LODASH-1040724", "url": "https://snyk.io/vuln/SNYK-JS-LODASH-1040724" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-06-01T13:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2179" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-engine-ui-extensions-0:1.2.6-1.el8ev.src", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.noarch", "8Base-RHV-S-4.4:ovirt-web-ui-0:1.6.9-1.el8ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-lodash: command injection via template" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.