Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-32804
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:56.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/tar" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/advisories/1770" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "node-tar", "vendor": "npm", "versions": [ { "status": "affected", "version": "\u003c 3.2.2" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.4.14" }, { "status": "affected", "version": "\u003e= 5.0.0, \u003c 5.0.6" }, { "status": "affected", "version": "\u003e= 6.0.0, \u003c 6.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-08T14:07:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/tar" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/advisories/1770" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ], "source": { "advisory": "GHSA-3jfq-g458-7qm9", "discovery": "UNKNOWN" }, "title": "Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32804", "STATE": "PUBLIC", "TITLE": "Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "node-tar", "version": { "version_data": [ { "version_value": "\u003c 3.2.2" }, { "version_value": "\u003e= 4.0.0, \u003c 4.4.14" }, { "version_value": "\u003e= 5.0.0, \u003c 5.0.6" }, { "version_value": "\u003e= 6.0.0, \u003c 6.1.1" } ] } } ] }, "vendor_name": "npm" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.npmjs.com/package/tar", "refsource": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "name": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "refsource": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "name": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4", "refsource": "MISC", "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "name": "https://www.npmjs.com/advisories/1770", "refsource": "MISC", "url": "https://www.npmjs.com/advisories/1770" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, "source": { "advisory": "GHSA-3jfq-g458-7qm9", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32804", "datePublished": "2021-08-03T19:10:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:56.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-32804\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-08-03T19:15:08.410\",\"lastModified\":\"2024-11-21T06:07:46.800\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The npm package \\\"tar\\\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.\"},{\"lang\":\"es\",\"value\":\"El paquete npm \\\"tar\\\" (tambi\u00e9n se conoce como node-tar) versiones anteriores a 6.1.1, 5.0.6, 4.4.14 y 3.3.2, presenta una vulnerabilidad de Creaci\u00f3n y Sobrescritura de archivos arbitraria debido a un saneo insuficiente de rutas absolutas. node-tar pretende impedir la extracci\u00f3n de rutas absolutas de archivos al convertir las rutas absolutas en relativas cuando el flag \\\"preservePaths\\\" no est\u00e1 establecido en \\\"true\\\". Esto se consigue eliminando el root de la ruta absoluta de cualquier ruta de archivo absoluta contenida en un archivo tar. Por ejemplo, \\\"home/user/.bashrc\\\" se convertir\u00eda en \\\"home/user/.bashrc\\\". Esta l\u00f3gica era insuficiente cuando las rutas de los archivos conten\u00edan roots de ruta repetidas, como \\\"////home/user/.bashrc\\\". \\\"node-tar\\\" s\u00f3lo eliminaba un \u00fanico root de esas rutas. Cuando se daba una ruta de archivo absoluta con ra\u00edces de ruta repetidas, la ruta resultante (por ejemplo, \\\"///home/user/.bashrc\\\") segu\u00eda resolvi\u00e9ndose como una ruta absoluta, permitiendo as\u00ed la creaci\u00f3n y sobrescritura de archivos arbitraria. Este problema se ha solucionado en las versiones 3.2.2, 4.4.14, 5.0.6 y 6.1.1. Los usuarios pueden solucionar esta vulnerabilidad sin necesidad de actualizar al crear un m\u00e9todo personalizado \\\"onentry\\\" que sanee \\\"entry.path\\\" o un m\u00e9todo \\\"filter\\\" que elimine las entradas con rutas absolutas. Consulte el aviso de GitHub mencionado para obtener m\u00e1s detalles. Tenga en cuenta CVE-2021-32803 que corrige un error similar en versiones posteriores de tar\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":5.8},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"3.2.2\",\"matchCriteriaId\":\"48083832-29DB-4428-836C-BC1072AC6384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.4.14\",\"matchCriteriaId\":\"77DE1692-7EF1-43FF-95CB-B1EAA8CB030B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndExcluding\":\"5.0.6\",\"matchCriteriaId\":\"EF8B9011-1EAA-4D9E-89CA-597D7309EE66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.1.1\",\"matchCriteriaId\":\"24EC2FC6-7549-4C94-9560-54A88703BCA5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"53B2BB06-A2F7-4603-89C3-C8500E55483A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"01E88C86-8C04-4A4A-BF45-9082AA783056\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.npmjs.com/advisories/1770\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.npmjs.com/package/tar\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.npmjs.com/advisories/1770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.npmjs.com/package/tar\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2021_3623
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:12/nodejs: Make FIPS options always available (BZ#1993927)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3623", "url": "https://access.redhat.com/errata/RHSA-2021:3623" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "1993927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993927" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3623.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security and bug fix update", "tracking": { "current_release_date": "2024-11-24T20:23:02+00:00", "generator": { "date": "2024-11-24T20:23:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:3623", "initial_release_date": "2021-09-21T13:22:11+00:00", "revision_history": [ { "date": "2021-09-21T13:22:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-21T13:22:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:23:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8040020210817133458:522a0ee4", "product": { "name": "nodejs:12:8040020210817133458:522a0ee4", "product_id": "nodejs:12:8040020210817133458:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8040020210817133458:522a0ee4" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "product": { "name": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "product_id": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.4.0%2B11732%2Bc668cc9f?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.4.0%2B12242%2Baf52a4c7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, "product_reference": "nodejs:12:8040020210817133458:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch" }, "product_reference": "nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64 as a component of nodejs:12:8040020210817133458:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-21T13:22:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3623" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debuginfo-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-debugsource-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-devel-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-docs-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-full-i18n-1:12.22.5-1.module+el8.4.0+12242+af52a4c7.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.4.0+11732+c668cc9f.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:12:8040020210817133458:522a0ee4:npm-1:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021_3666
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:14/nodejs: Make FIPS options always available (BZ#1993924)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3666", "url": "https://access.redhat.com/errata/RHSA-2021:3666" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "1993924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993924" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3666.json" } ], "title": "Red Hat Security Advisory: nodejs:14 security and bug fix update", "tracking": { "current_release_date": "2024-11-24T20:23:22+00:00", "generator": { "date": "2024-11-24T20:23:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:3666", "initial_release_date": "2021-09-27T07:40:58+00:00", "revision_history": [ { "date": "2021-09-27T07:40:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-27T07:40:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:23:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:14:8040020210817165654:522a0ee4", "product": { "name": "nodejs:14:8040020210817165654:522a0ee4", "product_id": "nodejs:14:8040020210817165654:522a0ee4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@14:8040020210817165654:522a0ee4" } } }, { "category": "product_version", "name": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "product": { "name": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "product_id": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product_id": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "product": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "product_id": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.14.17.5.1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product_id": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@2.0.3-1.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product_id": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@23-3.module%2Bel8.3.0%2B6519%2B9f98ed83?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "product": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "product_id": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.14.17.5.1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "product": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "product_id": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.14.17.5.1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@14.17.5-1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64", "product": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64", "product_id": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.14.17.5.1.module%2Bel8.4.0%2B12247%2Be2879e58?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, "product_reference": "nodejs:14:8040020210817165654:522a0ee4", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch" }, "product_reference": "nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src" }, "product_reference": "nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch" }, "product_reference": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src" }, "product_reference": "nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64" }, "product_reference": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le" }, "product_reference": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x" }, "product_reference": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64 as a component of nodejs:14:8040020210817165654:522a0ee4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" }, "product_reference": "npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-27T07:40:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debuginfo-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-debugsource-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-devel-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-docs-1:14.17.5-1.module+el8.4.0+12247+e2879e58.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-full-i18n-1:14.17.5-1.module+el8.4.0+12247+e2879e58.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-nodemon-0:2.0.3-1.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.noarch", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:nodejs-packaging-0:23-3.module+el8.3.0+6519+9f98ed83.src", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.s390x", "AppStream-8.4.0.Z.MAIN.EUS:nodejs:14:8040020210817165654:522a0ee4:npm-1:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021_3639
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.22.5). (BZ#1994941)\n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)\n\n* nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:12/nodejs: Make FIPS options always available (BZ#1993929)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3639", "url": "https://access.redhat.com/errata/RHSA-2021:3639" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1941471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941471" }, { "category": "external", "summary": "1943208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943208" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1979338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979338" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "1993929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993929" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3639.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security and bug fix update", "tracking": { "current_release_date": "2024-11-24T20:23:15+00:00", "generator": { "date": "2024-11-24T20:23:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:3639", "initial_release_date": "2021-09-22T08:55:39+00:00", "revision_history": [ { "date": "2021-09-22T08:55:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-22T08:55:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:23:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8010020210817113128:c27ad7f8", "product": { "name": "nodejs:12:8010020210817113128:c27ad7f8", "product_id": "nodejs:12:8010020210817113128:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8010020210817113128:c27ad7f8" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "product": { "name": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "product_id": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.1.0%2B12238%2B63fe3aec?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, "product_reference": "nodejs:12:8010020210817113128:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch" }, "product_reference": "nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64 as a component of nodejs:12:8010020210817113128:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22918", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1979338" } ], "notes": [ { "category": "description", "text": "A flaw has been found in libuv. Node.js is vulnerable to out-of-bounds read in libuv\u0027s uv__idna_toascii() function which is used to convert strings to ASCII which is called by Node\u0027s DNS module\u0027s lookup() function and can lead to information disclosures or crashes. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes", "title": "Vulnerability summary" }, { "category": "other", "text": "As distributed by Red Hat, a maximum of 3 bytes out of bound can be read. This would not be sufficient to crash nodejs or other applications using libuv, unless it was recompiled using an address sanitizer. The memory disclosure is also very limited.\n\nRed Hat Quay version 3.5 does not ship nodejs. Red Hat Quay version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22918" }, { "category": "external", "summary": "RHBZ#1979338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/" } ], "release_date": "2021-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-23362", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1943208" } ], "notes": [ { "category": "description", "text": "A regular expression denial of service vulnerability was found in hosted-git-info. If an application allows user input into the affected regular expression (regexp) function, `shortcutMatch` or `fromUrl`, then an attacker could craft a regexp which takes an ever increasing amount of time to process, potentially resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()", "title": "Vulnerability summary" }, { "category": "other", "text": "While some components do package a vulnerable version of hosted-git-info, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n\nSpecifically the following components:\n - The OCP hive-container does ship the vulnerable component, however since OCP 4.6 the Metering product has been deprecated [1], set as wont-fix and may be fixed in a future release.\n\nRed Hat Ceph Storage (RHCS) 4 packages a version of nodejs-hosted-git-info which is vulnerable to this flaw in the grafana-container shipped with it. \n\nRed Hat Quay includes hosted-git-info as a dependency of karma-coverage which is only used at development time. The hosted-git-info library is not used at runtime so the impact is low for Red Hat Quay.\n\nRed Hat Virtualization includes a vulnerable version of hosted-git-info, however it is only used during development. The hosted-git-info library is not used at runtime thus impact is rated Low and marked as \"wontfix\" at this time. Future updates may address this flaw.\n\n[1] - https://access.redhat.com/solutions/5707561", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23362" }, { "category": "external", "summary": "RHBZ#1943208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23362", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" } ], "release_date": "2021-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()" }, { "cve": "CVE-2021-27290", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941471" } ], "notes": [ { "category": "description", "text": "A flaw was found in ssri package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS). This issue only affects consumers\r\nusing the strict option. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst the OpenShift ServiceMesh (OSSM) servicemesh-grafana and servicemesh-prometheus include the vulnerable ssri library, the vulnerable \"strict\" option is not used. Similar to OSSM, OpenShift Container Platform (OCP), Red Hat Advance Cluster Management for Kubernetes (RHACM) and OpenShift distributed tracing components include the vulnerable ssri library but the \"strict\" option is not used. Additionally access to the vulnerable library is protected by OpenShift OAuth what reducing impact by this flaw to LOW. Therefore these OSSM, OCP, RHACM and OpenShift distributed tracing components have been marked as wont-fix and may be addressed in a future updates.\n\nRed Hat Virtualization includes ssri in cockpit-ovirt, ovirt-web-ui and ovirt-engine-ui-extensions, but the vulnerable \"strict\" option is not used. Additionally access to the vulnerable library is protected by RHV authentication. Therefore the impact of this flaw for RHV has been reduced to LOW and components have been marked as wont-fix and may be addressed in a future update.\n\nRed Hat Quay includes ssri as a dependency of webpack which is only used at build time. The library is not used at runtime, reducing the impact of this vulnerability to low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27290" }, { "category": "external", "summary": "RHBZ#1941471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27290", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" } ], "release_date": "2021-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T08:55:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3639" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debuginfo-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-debugsource-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-devel-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-docs-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-full-i18n-1:12.22.5-1.module+el8.1.0+12238+63fe3aec.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020210817113128:c27ad7f8:npm-1:6.14.14-1.12.22.5.1.module+el8.1.0+12238+63fe3aec.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021_5086
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated\nwith and optimized for the Red Hat OpenShift Container Platform. Red Hat\nOpenShift Data Foundation is a highly scalable, production-grade persistent\nstorage for stateful applications running in the Red Hat OpenShift\nContainer Platform. In addition to persistent storage, Red Hat OpenShift\nData Foundation provisions a multicloud data management service with an S3\ncompatible API.\n\nSecurity Fix(es):\n\n* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9 (CVE-2020-8565)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.\n\nThese updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to\nthese updated images, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5086", "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1810525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810525" }, { "category": "external", "summary": "1853638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853638" }, { "category": "external", "summary": "1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "1890438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890438" }, { "category": "external", "summary": "1890978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890978" }, { "category": "external", "summary": "1892709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892709" }, { "category": "external", "summary": "1901954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901954" }, { "category": "external", "summary": "1910790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910790" }, { "category": "external", "summary": "1927782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927782" }, { "category": "external", "summary": "1929242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929242" }, { "category": "external", "summary": "1932396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932396" }, { "category": "external", "summary": "1934625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934625" }, { "category": "external", "summary": "1956285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956285" }, { "category": "external", "summary": "1959793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959793" }, { "category": "external", "summary": "1964083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964083" }, { "category": "external", "summary": "1965322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965322" }, { "category": "external", "summary": "1968510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968510" }, { "category": "external", "summary": "1968606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968606" }, { "category": "external", "summary": "1969216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969216" }, { "category": "external", "summary": "1973256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973256" }, { "category": "external", "summary": "1975272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975272" }, { "category": "external", "summary": "1975581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975581" }, { "category": "external", "summary": "1979244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979244" }, { "category": "external", "summary": "1979502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979502" }, { "category": "external", "summary": "1980818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980818" }, { "category": "external", "summary": "1981331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981331" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1983756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983756" }, { "category": "external", "summary": "1984284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984284" }, { "category": "external", "summary": "1984334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984334" }, { "category": "external", "summary": "1984396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984396" }, { "category": "external", "summary": "1984735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984735" }, { "category": "external", "summary": "1985074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985074" }, { "category": "external", "summary": "1986444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986444" }, { "category": "external", "summary": "1986794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986794" }, { "category": "external", "summary": "1987806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987806" }, { "category": "external", "summary": "1988518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988518" }, { "category": "external", "summary": "1989482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989482" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990230" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1991822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991822" }, { "category": "external", "summary": "1992472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992472" }, { "category": "external", "summary": "1994261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994261" }, { "category": "external", "summary": "1994577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994577" }, { "category": "external", "summary": "1994584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994584" }, { "category": "external", "summary": "1994602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994602" }, { "category": "external", "summary": "1994606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994606" }, { "category": "external", "summary": "1994687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994687" }, { "category": "external", "summary": "1995009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995009" }, { "category": "external", "summary": "1995056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995056" }, { "category": "external", "summary": "1995271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995271" }, { "category": "external", "summary": "1995718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995718" }, { "category": "external", "summary": "1997237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997237" }, { "category": "external", "summary": "1997624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997624" }, { "category": "external", "summary": "1997738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997738" }, { "category": "external", "summary": "1997922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997922" }, { "category": "external", "summary": "1998851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998851" }, { "category": "external", "summary": "1999050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999050" }, { "category": "external", "summary": "1999731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999731" }, { "category": "external", "summary": "1999739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999739" }, { "category": "external", "summary": "1999748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999748" }, { "category": "external", "summary": "1999763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999763" }, { "category": "external", "summary": "1999767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999767" }, { "category": "external", "summary": "2000082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000082" }, { "category": "external", "summary": "2000098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000098" }, { "category": "external", "summary": "2000143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000143" }, { "category": "external", "summary": "2000190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000190" }, { "category": "external", "summary": "2000579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000579" }, { "category": "external", "summary": "2000588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000588" }, { "category": "external", "summary": "2000860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000860" }, { "category": "external", "summary": "2000865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000865" }, { "category": "external", "summary": "2001482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001482" }, { "category": "external", "summary": "2001539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001539" }, { "category": "external", "summary": "2001580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001580" }, { "category": "external", "summary": "2001970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001970" }, { "category": "external", "summary": "2002225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002225" }, { "category": "external", "summary": "2003444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003444" }, { "category": "external", "summary": "2003904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003904" }, { "category": "external", "summary": "2004003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004003" }, { "category": "external", "summary": "2004013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004013" }, { "category": "external", "summary": "2004030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004030" }, { "category": "external", "summary": "2004824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004824" }, { "category": "external", "summary": "2005103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005103" }, { "category": "external", "summary": "2005290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005290" }, { "category": "external", "summary": "2005812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005812" }, { "category": "external", "summary": "2005838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005838" }, { "category": "external", "summary": "2005843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005843" }, { "category": "external", "summary": "2005937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005937" }, { "category": "external", "summary": "2006176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006176" }, { "category": "external", "summary": "2006865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006865" }, { "category": "external", "summary": "2007130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007130" }, { "category": "external", "summary": "2007202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007202" }, { "category": "external", "summary": "2007212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007212" }, { "category": "external", "summary": "2007377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007377" }, { "category": "external", "summary": "2007717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007717" }, { "category": "external", "summary": "2010041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010041" }, { "category": "external", "summary": "2010185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010185" }, { "category": "external", "summary": "2010188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010188" }, { "category": "external", "summary": "2010194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010194" }, { "category": "external", "summary": "2010202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010202" }, { "category": "external", "summary": "2011225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011225" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5086.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update", "tracking": { "current_release_date": "2024-12-18T18:19:50+00:00", "generator": { "date": "2024-12-18T18:19:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2021:5086", "initial_release_date": "2021-12-13T19:26:22+00:00", "revision_history": [ { "date": "2021-12-13T19:26:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-13T19:26:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T18:19:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product": { "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product": { "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product_id": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product_id": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product": { "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product_id": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product": { "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product_id": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product": { "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product_id": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb?arch=s390x\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product": { "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product_id": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product": { "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product_id": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product_id": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product_id": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product": { "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product_id": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product_id": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product": { "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product_id": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product_id": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product": { "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product_id": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product": { "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product_id": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product": { "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product_id": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039?arch=ppc64le\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product": { "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product_id": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product": { "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product_id": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product_id": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product_id": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product": { "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product_id": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product_id": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product": { "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product_id": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product_id": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product": { "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product_id": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product": { "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product_id": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product": { "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product_id": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d?arch=amd64\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product": { "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product_id": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product": { "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product_id": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product_id": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product_id": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product": { "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product_id": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product_id": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x" }, "product_reference": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64" }, "product_reference": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le" }, "product_reference": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64" }, "product_reference": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le" }, "product_reference": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x" }, "product_reference": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le" }, "product_reference": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64" }, "product_reference": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x" }, "product_reference": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64" }, "product_reference": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le" }, "product_reference": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x" }, "product_reference": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x" }, "product_reference": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64" }, "product_reference": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le" }, "product_reference": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le" }, "product_reference": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x" }, "product_reference": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64" }, "product_reference": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Patrick Rhomberg" ], "organization": "purelyapplied", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8565", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886638" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support LogLevels higher than 8 (via \u0027TraceAll\u0027), and is therefore not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8565" }, { "category": "external", "summary": "RHBZ#1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95623", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-37701", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999731" } ], "notes": [ { "category": "description", "text": "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37701" }, { "category": "external", "summary": "RHBZ#1999731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999731" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37701", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37701" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1779", "url": "https://www.npmjs.com/advisories/1779" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-37712", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999739" } ], "notes": [ { "category": "description", "text": "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37712" }, { "category": "external", "summary": "RHBZ#1999739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999739" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1780", "url": "https://www.npmjs.com/advisories/1780" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-13T19:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite" } ] }
rhsa-2021_3638
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.22.5). (BZ#1994939)\n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)\n\n* nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode (CVE-2021-27290)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes (CVE-2021-22918)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:12/nodejs: Make FIPS options always available (BZ#1993928)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3638", "url": "https://access.redhat.com/errata/RHSA-2021:3638" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1941471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941471" }, { "category": "external", "summary": "1943208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943208" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1979338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979338" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "1993928", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993928" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3638.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security and bug fix update", "tracking": { "current_release_date": "2024-11-24T20:23:09+00:00", "generator": { "date": "2024-11-24T20:23:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:3638", "initial_release_date": "2021-09-22T09:06:26+00:00", "revision_history": [ { "date": "2021-09-22T09:06:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-22T09:06:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:23:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8020020210817125332:4cda2c84", "product": { "name": "nodejs:12:8020020210817125332:4cda2c84", "product_id": "nodejs:12:8020020210817125332:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8020020210817125332:4cda2c84" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "product": { "name": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "product_id": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.22.5-1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64", "product": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64", "product_id": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.14-1.12.22.5.1.module%2Bel8.2.0%2B12241%2Ba3db445b?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, "product_reference": "nodejs:12:8020020210817125332:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch" }, "product_reference": "nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64 as a component of nodejs:12:8020020210817125332:4cda2c84 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" }, "product_reference": "npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22918", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1979338" } ], "notes": [ { "category": "description", "text": "A flaw has been found in libuv. Node.js is vulnerable to out-of-bounds read in libuv\u0027s uv__idna_toascii() function which is used to convert strings to ASCII which is called by Node\u0027s DNS module\u0027s lookup() function and can lead to information disclosures or crashes. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes", "title": "Vulnerability summary" }, { "category": "other", "text": "As distributed by Red Hat, a maximum of 3 bytes out of bound can be read. This would not be sufficient to crash nodejs or other applications using libuv, unless it was recompiled using an address sanitizer. The memory disclosure is also very limited.\n\nRed Hat Quay version 3.5 does not ship nodejs. Red Hat Quay version 3.4 consumes the nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because they don\u0027t use nodejs as a HTTP server.\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22918" }, { "category": "external", "summary": "RHBZ#1979338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/" } ], "release_date": "2021-07-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-23362", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1943208" } ], "notes": [ { "category": "description", "text": "A regular expression denial of service vulnerability was found in hosted-git-info. If an application allows user input into the affected regular expression (regexp) function, `shortcutMatch` or `fromUrl`, then an attacker could craft a regexp which takes an ever increasing amount of time to process, potentially resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()", "title": "Vulnerability summary" }, { "category": "other", "text": "While some components do package a vulnerable version of hosted-git-info, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n\nSpecifically the following components:\n - The OCP hive-container does ship the vulnerable component, however since OCP 4.6 the Metering product has been deprecated [1], set as wont-fix and may be fixed in a future release.\n\nRed Hat Ceph Storage (RHCS) 4 packages a version of nodejs-hosted-git-info which is vulnerable to this flaw in the grafana-container shipped with it. \n\nRed Hat Quay includes hosted-git-info as a dependency of karma-coverage which is only used at development time. The hosted-git-info library is not used at runtime so the impact is low for Red Hat Quay.\n\nRed Hat Virtualization includes a vulnerable version of hosted-git-info, however it is only used during development. The hosted-git-info library is not used at runtime thus impact is rated Low and marked as \"wontfix\" at this time. Future updates may address this flaw.\n\n[1] - https://access.redhat.com/solutions/5707561", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23362" }, { "category": "external", "summary": "RHBZ#1943208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23362", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" } ], "release_date": "2021-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()" }, { "cve": "CVE-2021-27290", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941471" } ], "notes": [ { "category": "description", "text": "A flaw was found in ssri package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS). This issue only affects consumers\r\nusing the strict option. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst the OpenShift ServiceMesh (OSSM) servicemesh-grafana and servicemesh-prometheus include the vulnerable ssri library, the vulnerable \"strict\" option is not used. Similar to OSSM, OpenShift Container Platform (OCP), Red Hat Advance Cluster Management for Kubernetes (RHACM) and OpenShift distributed tracing components include the vulnerable ssri library but the \"strict\" option is not used. Additionally access to the vulnerable library is protected by OpenShift OAuth what reducing impact by this flaw to LOW. Therefore these OSSM, OCP, RHACM and OpenShift distributed tracing components have been marked as wont-fix and may be addressed in a future updates.\n\nRed Hat Virtualization includes ssri in cockpit-ovirt, ovirt-web-ui and ovirt-engine-ui-extensions, but the vulnerable \"strict\" option is not used. Additionally access to the vulnerable library is protected by RHV authentication. Therefore the impact of this flaw for RHV has been reduced to LOW and components have been marked as wont-fix and may be addressed in a future update.\n\nRed Hat Quay includes ssri as a dependency of webpack which is only used at build time. The library is not used at runtime, reducing the impact of this vulnerability to low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27290" }, { "category": "external", "summary": "RHBZ#1941471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27290", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" } ], "release_date": "2021-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-09-22T09:06:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3638" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debuginfo-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-debugsource-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-devel-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-docs-1:12.22.5-1.module+el8.2.0+12241+a3db445b.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-full-i18n-1:12.22.5-1.module+el8.2.0+12241+a3db445b.x86_64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.aarch64", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.ppc64le", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.s390x", "AppStream-8.2.0.Z.EUS:nodejs:12:8020020210817125332:4cda2c84:npm-1:6.14.14-1.12.22.5.1.module+el8.2.0+12241+a3db445b.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021_3281
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.22.5).\n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3281", "url": "https://access.redhat.com/errata/RHSA-2021:3281" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1945459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3281.json" } ], "title": "Red Hat Security Advisory: rh-nodejs12-nodejs and rh-nodejs12-nodejs-nodemon security update", "tracking": { "current_release_date": "2024-11-24T20:22:37+00:00", "generator": { "date": "2024-11-24T20:22:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:3281", "initial_release_date": "2021-08-26T10:18:55+00:00", "revision_history": [ { "date": "2021-08-26T10:18:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-26T10:18:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:22:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "product": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "product_id": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "product": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "product_id": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.5-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "product": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "product_id": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.14-12.22.5.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.5-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.5-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "product": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "product_id": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.14-12.22.5.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.5-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.5-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.22.5-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "product": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "product_id": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.14-12.22.5.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.22.5-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "product_id": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.22.5-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product_id": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-28469", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945459" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-glob-parent: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28469" }, { "category": "external", "summary": "RHBZ#1945459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28469", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", "url": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905" } ], "release_date": "2021-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-glob-parent: Regular expression denial of service" }, { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:18:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3281" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-debuginfo-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-devel-0:12.22.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-docs-0:12.22.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs12-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs12-npm-0:6.14.14-12.22.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
rhsa-2021_4618
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.0 General\nAvailability release images, which fix several bugs and security issues.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs and security issues. See\nthe following Release Notes documentation, which will be updated shortly\nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.4/html/release_notes/\n\nSecurity fixes: \n\n* CVE-2021-33623: nodejs-trim-newlines: ReDoS in .end() method\n\n* CVE-2021-32626: redis: Lua scripts can overflow the heap-based Lua stack\n\n* CVE-2021-32627: redis: Integer overflow issue with Streams\n\n* CVE-2021-32628: redis: Integer overflow bug in the ziplist data structure\n\n* CVE-2021-32672: redis: Out of bounds read in lua debugger protocol parser\n\n* CVE-2021-32675: redis: Denial of service via Redis Standard Protocol (RESP) request\n\n* CVE-2021-32687: redis: Integer overflow issue with intsets\n\n* CVE-2021-32690: helm: information disclosure vulnerability\n\n* CVE-2021-32803: nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite\n\n* CVE-2021-32804: nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite\n\n* CVE-2021-23017: nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name\n\n* CVE-2021-3711: openssl: SM2 Decryption Buffer Overflow\n\n* CVE-2021-3712: openssl: Read buffer overruns processing ASN.1 strings\n\n* CVE-2021-3749: nodejs-axios: Regular expression denial of service in trim function\n\n* CVE-2021-41099: redis: Integer overflow issue with strings\n\nBug fixes:\n\n* RFE ACM Application management UI doesn\u0027t reflect object status (Bugzilla #1965321)\n\n* RHACM 2.4 files (Bugzilla #1983663)\n\n* Hive Operator CrashLoopBackOff when deploying ACM with latest downstream 2.4 (Bugzilla #1993366)\n\n* submariner-addon pod failing in RHACM 2.4 latest ds snapshot (Bugzilla #1994668)\n\n* ACM 2.4 install on OCP 4.9 ipv6 disconnected hub fails due to multicluster pod in clb (Bugzilla #2000274)\n\n* pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2003915)\n\n* InfraEnv condition does not reflect the actual error message (Bugzilla #2009204, 2010030)\n\n* Flaky test point to a nil pointer conditions list (Bugzilla #2010175)\n\n* InfraEnv status shows \u0027Failed to create image: internal error (Bugzilla #2010272)\n\n* subctl diagnose firewall intra-cluster - failed VXLAN checks (Bugzilla #2013157)\n\n* pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2014084)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4618", "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1963121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963121" }, { "category": "external", "summary": "1965321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965321" }, { "category": "external", "summary": "1966615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "category": "external", "summary": "1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "1983663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983663" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993366" }, { "category": "external", "summary": "1994668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994668" }, { "category": "external", "summary": "1995623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "category": "external", "summary": "1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "2000274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000274" }, { "category": "external", "summary": "2003915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003915" }, { "category": "external", "summary": "2009204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009204" }, { "category": "external", "summary": "2010030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010030" }, { "category": "external", "summary": "2010175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010175" }, { "category": "external", "summary": "2010272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010272" }, { "category": "external", "summary": "2010991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010991" }, { "category": "external", "summary": "2011000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011000" }, { "category": "external", "summary": "2011001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011001" }, { "category": "external", "summary": "2011004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011004" }, { "category": "external", "summary": "2011010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011010" }, { "category": "external", "summary": "2011017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011017" }, { "category": "external", "summary": "2011020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011020" }, { "category": "external", "summary": "2013157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013157" }, { "category": "external", "summary": "2014084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014084" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4618.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4 images and security updates", "tracking": { "current_release_date": "2024-12-15T19:50:36+00:00", "generator": { "date": "2024-12-15T19:50:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2021:4618", "initial_release_date": "2021-11-11T18:31:07+00:00", "revision_history": [ { "date": "2021-11-11T18:31:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-11T18:31:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T19:50:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product_id": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product_id": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product": { "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product_id": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-operator-bundle\u0026tag=v2.4.0-168" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product_id": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product": { "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product_id": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product_id": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product": { "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product_id": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product_id": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-agent-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product_id": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product_id": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product": { "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product_id": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product_id": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product": { "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product_id": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product": { "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product_id": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product_id": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product_id": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product_id": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product": { "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product_id": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product": { "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product_id": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product_id": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product": { "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product_id": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product_id": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product": { "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product_id": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product": { "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product_id": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product": { "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product_id": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product": { "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product_id": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product": { "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product_id": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product_id": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product_id": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product_id": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product_id": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product": { "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product_id": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product_id": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product": { "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product_id": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product_id": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product": { "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product_id": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product": { "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product_id": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product_id": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64" }, "product_reference": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x" }, "product_reference": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le" }, "product_reference": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64" }, "product_reference": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x" }, "product_reference": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64" }, "product_reference": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le" }, "product_reference": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le" }, "product_reference": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x" }, "product_reference": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64" }, "product_reference": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le" }, "product_reference": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le" }, "product_reference": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "John Ouyang", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3711", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995623" } ], "notes": [ { "category": "description", "text": "A flaw was found in openssl. A miscalculation of a buffer size was found in openssl\u0027s SM2 decryption function, allowing up to 62 arbitrary bytes to be written outside of the buffer. A remote attacker could use this flaw to crash an application supporting SM2 signature or encryption algorithm, or, possibly, execute arbitrary code with the permissions of the user running that application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SM2 Decryption Buffer Overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenSSL packages shipped with Red Hat Enterprise Linux 8 are not compiled with support for SM2 algorithm and therefore are not affected by this flaw. Packages shipped with Red Hat Enterprise Linux 7 and older do not support the SM2 algorithm. \n\nThe Red Hat Advanced Cluster Management for Kubernetes 2.3.1 and the previous versions are using the vulnerable version of the OpenSSL library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "RHBZ#1995623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3711", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SM2 Decryption Buffer Overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999784" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-axios: Regular expression denial of service in trim function", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3749" }, { "category": "external", "summary": "RHBZ#1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929", "url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" }, { "category": "external", "summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31", "url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-axios: Regular expression denial of service in trim function" }, { "cve": "CVE-2021-23017", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1963121" } ], "notes": [ { "category": "description", "text": "A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23017" }, { "category": "external", "summary": "RHBZ#1963121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23017", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23017" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name" }, { "acknowledgments": [ { "names": [ "Meir Shpilraien" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32626", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011017" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was found in redis. Specially crafted Lua scripts executing in Redis cause the heap-based Lua stack to overflow due to incomplete checks for this condition. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Lua scripts can overflow the heap-based Lua stack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32626" }, { "category": "external", "summary": "RHBZ#2011017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32626", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32626" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c", "url": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Lua scripts can overflow the heap-based Lua stack" }, { "acknowledgments": [ { "names": [ "sundb" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32627", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011010" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis. The vulnerability involves changing the default \"proto-max-bulk-len\" and \"client-query-buffer-limit\" configuration parameters to very large values and constructing specially crafted large stream elements. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with Streams", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32627" }, { "category": "external", "summary": "RHBZ#2011010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32627", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v", "url": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `proto-max-bulk-len` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with Streams" }, { "acknowledgments": [ { "names": [ "sundb" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32628", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011004" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in the redis ziplist data structure. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value) to a very large value, and then constructing specially crafted commands to create very large ziplists. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow bug in the ziplist data structure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32628" }, { "category": "external", "summary": "RHBZ#2011004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32628", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr", "url": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the above configuration parameters. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow bug in the ziplist data structure" }, { "acknowledgments": [ { "names": [ "Meir Shpilraien" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32672", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011001" } ], "notes": [ { "category": "description", "text": "A flaw was found in redis. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger\u2019s protocol parser to read data beyond the actual buffer, potentially leading to an information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Out of bounds read in lua debugger protocol parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32672" }, { "category": "external", "summary": "RHBZ#2011001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm", "url": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "redis: Out of bounds read in lua debugger protocol parser" }, { "cve": "CVE-2021-32675", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011000" } ], "notes": [ { "category": "description", "text": "A flaw was found in redis. When parsing an incoming Redis Standard Protocol (RESP) request, redis allocates memory according to user-specified values, which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). This flaw allows an unauthenticated, remote user delivering specially crafted requests over multiple connections to cause the server to allocate a significant amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Denial of service via Redis Standard Protocol (RESP) request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32675" }, { "category": "external", "summary": "RHBZ#2011000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32675", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p", "url": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Prevent unauthenticated users from connecting to Redis by using network access control tools (e.g., firewalls) or enabling TLS and requiring users to authenticate using client side certificates.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Denial of service via Redis Standard Protocol (RESP) request" }, { "acknowledgments": [ { "names": [ "Pawel Wieczorkiewicz" ], "organization": "Amazon Web Services", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32687", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010991" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis. The vulnerability involves changing the default \"set-max-intset-entries\" configuration parameter to a very large value and constructing specially crafted commands to manipulate sets. This flaw allows a remote attacker to leak arbitrary contents of the heap or potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with intsets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32687" }, { "category": "external", "summary": "RHBZ#2010991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32687", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q", "url": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `set-max-intset-entries` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with intsets" }, { "cve": "CVE-2021-32690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1978144" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: information disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Advanced Cluster Management for Kubernetes:\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all.\n\nOpenShift Developer Tools and Services:\n\nThe OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32690" }, { "category": "external", "summary": "RHBZ#1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf", "url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf" } ], "release_date": "2021-06-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: information disclosure vulnerability" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-33623", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966615" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-trim-newlines. Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-trim-newlines: ReDoS in .end() method", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) grafana-container does package a vulnerable verison of nodejs trim-newlines. However due to the instance being read only and behind OpenShift OAuth, the impact by this vulnerability is Low. Red Hat Advanced Cluster Management for Kubernetes (ACM) containers affected by this flaw are only accessible to authenticated users, thus the impact of this vulnerability is Low. \nRed Hat Virtualization (RHV) does package a vulnerable version of nodejs-trim-newlines. However, no untrusted content is being parsed therefore the impact of this vulnerability is Low.\n\nThe hosted services are shipped with the vulnerable packages, however the vulnerable methods were not identified in use at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33623" }, { "category": "external", "summary": "RHBZ#1966615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33623", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623" } ], "release_date": "2021-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-trim-newlines: ReDoS in .end() method" }, { "acknowledgments": [ { "names": [ "yiyuaner" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-41099", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011020" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis in the underlying string library. The vulnerability involves changing the default \"proto-max-bulk-len\" configuration parameter to a very large value and constructing specially crafted network payloads or commands. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with strings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41099" }, { "category": "external", "summary": "RHBZ#2011020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41099", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph", "url": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `proto-max-bulk-len` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with strings" } ] }
rhsa-2021_3280
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.17.5).\n\nSecurity Fix(es):\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22930)\n\n* nodejs: Use-after-free on close http2 on stream canceling (CVE-2021-22940)\n\n* nodejs-ini: Prototype pollution via malicious INI file (CVE-2020-7788)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)\n\n* nodejs: Improper handling of untypical characters in domain names (CVE-2021-22931)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* nodejs: Incomplete validation of tls rejectUnauthorized parameter (CVE-2021-22939)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3280", "url": "https://access.redhat.com/errata/RHSA-2021:3280" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "1945459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3280.json" } ], "title": "Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update", "tracking": { "current_release_date": "2024-11-24T20:22:31+00:00", "generator": { "date": "2024-11-24T20:22:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:3280", "initial_release_date": "2021-08-26T10:21:32+00:00", "revision_history": [ { "date": "2021-08-26T10:21:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-26T10:21:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T20:22:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "product": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "product_id": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.5-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "product": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "product_id": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-5.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.5-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.17.5-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "product": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "product_id": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.14-14.17.5.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.17.5-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.5-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.17.5-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "product": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "product_id": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.14-14.17.5.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.17.5-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.5-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-devel@14.17.5-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "product": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "product_id": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-npm@6.14.14-14.17.5.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "product": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "product_id": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-debuginfo@14.17.5-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "product": { "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "product_id": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-docs@14.17.5-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product_id": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-5.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64" }, "product_reference": "rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" }, "product_reference": "rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.7" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" }, "product_reference": "rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7788", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1907444" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-ini. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ini: Prototype pollution via malicious INI file", "title": "Vulnerability summary" }, { "category": "other", "text": "Node.JS packages in Red Hat Enterprise Linux and Red Hat Software Collections included the vulnerable dependency packaged in \"nodejs-npm\" component. Processing malicious files using npm could potentially trigger this vulnerability. The \"ini\" package bundled with npm was not in the library path where it could be included directly in other programs.\n\nThe nodejs-nodemon packages in Red Hat Enterprise Linux and Red Hat Software Collections are affected by this vulnerability as they bundle the nodejs-ini library. Usage of that library is governed by nodemon itself, so applications started by nodemon are not impacted. Further, nodemon is a developer tool not intended to be used in production.\n\nThe ini package is included in Red Hat Quay by protractor and webpack-cli, both of which are dev dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7788" }, { "category": "external", "summary": "RHBZ#1907444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ini: Prototype pollution via malicious INI file" }, { "cve": "CVE-2020-28469", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945459" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-glob-parent. The enclosure regex used to check for glob enclosures containing backslashes is vulnerable to Regular Expression Denial of Service attacks. This flaw allows an attacker to cause a denial of service if they can supply a malicious string to the glob-parent function. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-glob-parent: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "While some components do package a vulnerable version of glob-parent, access to them requires OpenShift OAuth credentials and hence have been marked with a Low impact. This applies to the following products:\n - OpenShift Container Platform (OCP)\n - OpenShift ServiceMesh (OSSM)\n - Red Hat Advanced Cluster Management for Kubernetes (RHACM)\n - OpenShift distributed tracing", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28469" }, { "category": "external", "summary": "RHBZ#1945459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28469", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905", "url": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905" } ], "release_date": "2021-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-glob-parent: Regular expression denial of service" }, { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988342" } ], "notes": [ { "category": "description", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "c-ares: Missing input validation of host names may lead to domain hijacking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3672" }, { "category": "external", "summary": "RHBZ#1988342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "https://c-ares.haxx.se/adv_20210810.html", "url": "https://c-ares.haxx.se/adv_20210810.html" } ], "release_date": "2021-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "c-ares: Missing input validation of host names may lead to domain hijacking" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1988394" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit the memory corruption, which causes a change in the process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22930" }, { "category": "external", "summary": "RHBZ#1988394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22930", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" } ], "release_date": "2021-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993019" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. These vulnerabilities include remote code execution, Cross-site scripting (XSS), application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library, which can lead to the output of wrong hostnames (leading to Domain hijacking) and injection vulnerabilities in applications using the library.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Improper handling of untypical characters in domain names", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22931" }, { "category": "external", "summary": "RHBZ#1993019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22931", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Improper handling of untypical characters in domain names" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993039" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js. If the Node.js HTTPS API is used incorrectly and \"undefined\" is passed for the \"rejectUnauthorized\" parameter, no error is returned, and the connections to servers with an expired certificate are accepted. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Incomplete validation of tls rejectUnauthorized parameter", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22939" }, { "category": "external", "summary": "RHBZ#1993039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Incomplete validation of tls rejectUnauthorized parameter" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-08-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1993029" } ], "notes": [ { "category": "description", "text": "A flaw was found in Node.js, where it is vulnerable to a use-after-free attack. This flaw allows an attacker to exploit memory corruption to change process behavior. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Use-after-free on close http2 on stream canceling", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is a follow-up to CVE-2021-22930, as the issue was not completely resolved in the fix for CVE-2021-22930. Node.js as shipped in Red Hat Enterprise Linux 8 streams and Red Hat Software Collections is not explicitly affected by the incomplete fix because the incomplete fix was not released, but the original issue does affect these components.\n\nRed Hat Quay from version 3.4 consumes nodejs from RHEL, so security tracking is provided by the container health index on the customer portal [1]. Additionally there is no impact from this issue on Quay 3.3 and 3.2 because nodejs is only used at build time and is no longer shipped, starting with Quay 3.5 [2].\n[1] https://catalog.redhat.com/software/containers/quay/quay-rhel8/600e03aadd19c7786c43ae49?container-tabs=security\n[2] https://issues.redhat.com/browse/PROJQUAY-1409\nTherefore Quay component is marked as \"Will not fix\" with impact LOW.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22940" }, { "category": "external", "summary": "RHBZ#1993029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22940", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/" } ], "release_date": "2021-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Use-after-free on close http2 on stream canceling" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "known_not_affected": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-nodemon-0:2.0.3-5.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-08-26T10:21:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3280" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7-7.7.Z:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Server-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Server-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.src", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-debuginfo-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-devel-0:14.17.5-1.el7.x86_64", "7Workstation-RHSCL-3.7:rh-nodejs14-nodejs-docs-0:14.17.5-1.el7.noarch", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.ppc64le", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.s390x", "7Workstation-RHSCL-3.7:rh-nodejs14-npm-0:6.14.14-14.17.5.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" } ] }
wid-sec-w-2023-0856
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0856 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0856.json" }, { "category": "self", "summary": "WID-SEC-2023-0856 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0856" }, { "category": "external", "summary": "IBM Security Bulletin 6980799 vom 2023-04-04", "url": "https://www.ibm.com/support/pages/node/6980799" }, { "category": "external", "summary": "IBM Security Bulletin vom 2022-05-31", "url": "https://www.ibm.com/support/pages/node/6590981" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-04T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:48:07.215+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0856", "initial_release_date": "2022-05-31T22:00:00.000+00:00", "revision_history": [ { "date": "2022-05-31T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM QRadar SIEM \u003c 3.0.1", "product": { "name": "IBM QRadar SIEM \u003c 3.0.1", "product_id": "T023376", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:3.0.1" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-11655", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-11656" }, { "cve": "CVE-2020-13434", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13434" }, { "cve": "CVE-2020-13435", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13435" }, { "cve": "CVE-2020-13630", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-13632" }, { "cve": "CVE-2020-15168", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-15168" }, { "cve": "CVE-2020-15358", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-15358" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-7788", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-7788" }, { "cve": "CVE-2020-9327", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2020-9327" }, { "cve": "CVE-2021-22918", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22918" }, { "cve": "CVE-2021-22930", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22930" }, { "cve": "CVE-2021-22931", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22931" }, { "cve": "CVE-2021-22939", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22939" }, { "cve": "CVE-2021-22940", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-22940" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23362", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-23362" }, { "cve": "CVE-2021-27290", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-27290" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33502", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-33502" }, { "cve": "CVE-2021-3672", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-3672" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-3918", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen im Zusammenhang mit bekannten Sicherheitsl\u00fccken in den Komponenten Node.js und SQLite. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden." } ], "release_date": "2022-05-31T22:00:00.000+00:00", "title": "CVE-2021-3918" } ] }
wid-sec-w-2022-0092
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0092 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0092.json" }, { "category": "self", "summary": "WID-SEC-2022-0092 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0092" }, { "category": "external", "summary": "NodeJs Security Release vom 2021-08-31", "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3638 vom 2021-09-22", "url": "https://access.redhat.com/errata/RHSA-2021:3638" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3639 vom 2021-09-22", "url": "https://access.redhat.com/errata/RHSA-2021:3639" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3623 vom 2021-09-21", "url": "https://access.redhat.com/errata/RHSA-2021:3623" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-3623 vom 2021-09-22", "url": "http://linux.oracle.com/errata/ELSA-2021-3623.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3666 vom 2021-09-28", "url": "https://access.redhat.com/errata/RHSA-2021:3666" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-3666 vom 2021-09-28", "url": "http://linux.oracle.com/errata/ELSA-2021-3666.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4618 vom 2021-11-11", "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "external", "summary": "Debian Security Advisory DSA-5008 vom 2021-11-12", "url": "https://www.debian.org/security/2021/dsa-5008" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3886-1 vom 2021-12-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009816.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3940-1 vom 2021-12-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3964-1 vom 2021-12-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5086 vom 2021-12-13", "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0041 vom 2022-01-06", "url": "https://access.redhat.com/errata/RHSA-2022:0041" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0101-1 vom 2022-01-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-January/010017.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0246 vom 2022-01-25", "url": "https://access.redhat.com/errata/RHSA-2022:0246" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:4914 vom 2022-06-06", "url": "https://access.redhat.com/errata/RHSA-2022:4914" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0350 vom 2022-02-02", "url": "https://access.redhat.com/errata/RHSA-2022:0350" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-0350 vom 2022-02-02", "url": "http://linux.oracle.com/errata/ELSA-2022-0350.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1717-1 vom 2022-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011058.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0531-1 vom 2022-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010279.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0563-1 vom 2022-02-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0569-1 vom 2022-02-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010307.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0570-1 vom 2022-02-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010306.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0657-1 vom 2022-03-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0704-1 vom 2022-03-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0715-1 vom 2022-03-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3237 vom 2022-12-12", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-29 vom 2024-05-08", "url": "https://security.gentoo.org/glsa/202405-29" } ], "source_lang": "en-US", "title": "Node.js: Mehrere Schwachstellen erm\u00f6glichen Manipulation von Dateien", "tracking": { "current_release_date": "2024-05-09T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:26:27.934+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0092", "initial_release_date": "2021-08-31T22:00:00.000+00:00", "revision_history": [ { "date": "2021-08-31T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-09-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-09-27T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2021-11-11T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-14T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-12-02T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-06T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-07T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-13T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-06T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-18T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-01-24T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-01T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-02T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-02-21T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-02-24T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-02T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-03T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-06T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-05-17T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-06T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-12T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-05-09T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Gentoo aufgenommen" } ], "status": "final", "version": "24" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cv12.22.6 (LTS)", "product": { "name": "Open Source Node.js \u003cv12.22.6 (LTS)", "product_id": "T020280" } }, { "category": "product_version_range", "name": "\u003cv14.17.6 (LTS)", "product": { "name": "Open Source Node.js \u003cv14.17.6 (LTS)", "product_id": "T020281" } } ], "category": "product_name", "name": "Node.js" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-39134", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-39134" }, { "cve": "CVE-2021-39135", "notes": [ { "category": "description", "text": "In Node.js existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Modulen \"tar\" und \"@npmcli/arborist\" und aufgrund von Symlink-Fehlern. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T012167", "T004914" ] }, "release_date": "2021-08-31T22:00:00.000+00:00", "title": "CVE-2021-39135" } ] }
wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1591 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json" }, { "category": "self", "summary": "WID-SEC-2024-1591 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591" }, { "category": "external", "summary": "Juniper Patchday July 2024 vom 2024-07-10", "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D" } ], "source_lang": "en-US", "title": "Juniper JUNOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-11T23:00:00.000+00:00", "generator": { "date": "2024-11-12T09:31:28.569+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1591", "initial_release_date": "2024-07-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "2", "summary": "URL Kodierung angepasst" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "T036093", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2006-20001" }, { "cve": "CVE-2007-5846", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2007-5846" }, { "cve": "CVE-2008-6123", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2008-6123" }, { "cve": "CVE-2011-1473", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-1473" }, { "cve": "CVE-2011-5094", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-5094" }, { "cve": "CVE-2012-6151", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2012-6151" }, { "cve": "CVE-2014-10064", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-10064" }, { "cve": "CVE-2014-2285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2285" }, { "cve": "CVE-2014-2310", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2310" }, { "cve": "CVE-2014-3565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-3565" }, { "cve": "CVE-2014-7191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-7191" }, { "cve": "CVE-2014-8882", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-8882" }, { "cve": "CVE-2015-5621", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-5621" }, { "cve": "CVE-2015-8100", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-8100" }, { "cve": "CVE-2015-9262", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-9262" }, { "cve": "CVE-2016-1000232", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-1000232" }, { "cve": "CVE-2016-10540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-10540" }, { "cve": "CVE-2016-4658", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-4658" }, { "cve": "CVE-2017-1000048", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-1000048" }, { "cve": "CVE-2017-15010", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-15010" }, { "cve": "CVE-2018-18065", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-18065" }, { "cve": "CVE-2018-20834", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-20834" }, { "cve": "CVE-2018-3737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-3737" }, { "cve": "CVE-2018-7408", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-7408" }, { "cve": "CVE-2019-10081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10097", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10097" }, { "cve": "CVE-2019-10098", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10098" }, { "cve": "CVE-2019-11719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11719" }, { "cve": "CVE-2019-11727", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11727" }, { "cve": "CVE-2019-11756", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11756" }, { "cve": "CVE-2019-16775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16775" }, { "cve": "CVE-2019-16776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16776" }, { "cve": "CVE-2019-16777", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16777" }, { "cve": "CVE-2019-17006", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17006" }, { "cve": "CVE-2019-17023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17023" }, { "cve": "CVE-2019-17567", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17567" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-20892", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20892" }, { "cve": "CVE-2019-9517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-9517" }, { "cve": "CVE-2020-11668", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11668" }, { "cve": "CVE-2020-11984", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11984" }, { "cve": "CVE-2020-11993", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11993" }, { "cve": "CVE-2020-12362", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12362" }, { "cve": "CVE-2020-12400", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12400" }, { "cve": "CVE-2020-12401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12401" }, { "cve": "CVE-2020-12402", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12402" }, { "cve": "CVE-2020-12403", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12403" }, { "cve": "CVE-2020-13938", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13938" }, { "cve": "CVE-2020-13950", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13950" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-14145" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-15862", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15862" }, { "cve": "CVE-2020-1927", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1927" }, { "cve": "CVE-2020-1934", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1934" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28502" }, { "cve": "CVE-2020-35452", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-35452" }, { "cve": "CVE-2020-36049", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-36049" }, { "cve": "CVE-2020-6829", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-6829" }, { "cve": "CVE-2020-7660", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7660" }, { "cve": "CVE-2020-7754", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7754" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8648", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-8648" }, { "cve": "CVE-2020-9490", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-9490" }, { "cve": "CVE-2021-22543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-22543" }, { "cve": "CVE-2021-2342", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2342" }, { "cve": "CVE-2021-23440", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-23440" }, { "cve": "CVE-2021-2356", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2356" }, { "cve": "CVE-2021-2372", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2372" }, { "cve": "CVE-2021-2385", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2385" }, { "cve": "CVE-2021-2389", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2389" }, { "cve": "CVE-2021-2390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2390" }, { "cve": "CVE-2021-25745", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25745" }, { "cve": "CVE-2021-25746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25746" }, { "cve": "CVE-2021-25748", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25748" }, { "cve": "CVE-2021-26690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26690" }, { "cve": "CVE-2021-26691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26691" }, { "cve": "CVE-2021-27290", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-27290" }, { "cve": "CVE-2021-29469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-29469" }, { "cve": "CVE-2021-30641", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-30641" }, { "cve": "CVE-2021-31535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31535" }, { "cve": "CVE-2021-31618", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31618" }, { "cve": "CVE-2021-3177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3177" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33033", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33033" }, { "cve": "CVE-2021-33034", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33193", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33193" }, { "cve": "CVE-2021-3347", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3347" }, { "cve": "CVE-2021-33909", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33909" }, { "cve": "CVE-2021-34798", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-34798" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-36160", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-36160" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-40438", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-40438" }, { "cve": "CVE-2021-41524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41524" }, { "cve": "CVE-2021-41773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41773" }, { "cve": "CVE-2021-42013", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-42013" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44225", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44225" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44906", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44906" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21417", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21417" }, { "cve": "CVE-2022-21427", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21427" }, { "cve": "CVE-2022-21444", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21444" }, { "cve": "CVE-2022-21451", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21451" }, { "cve": "CVE-2022-21454", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21454" }, { "cve": "CVE-2022-21460", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21460" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21595" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23524" }, { "cve": "CVE-2022-23525", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23525" }, { "cve": "CVE-2022-23526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23526" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26377", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-26377" }, { "cve": "CVE-2022-28330", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28330" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-29167", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29167" }, { "cve": "CVE-2022-29404", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29404" }, { "cve": "CVE-2022-30522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30522" }, { "cve": "CVE-2022-30556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30556" }, { "cve": "CVE-2022-31813", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-31813" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-41741", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41741" }, { "cve": "CVE-2022-41742", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41742" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-46663", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-46663" }, { "cve": "CVE-2022-4886", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4886" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-1255", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-1255" }, { "cve": "CVE-2023-2002", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2002" }, { "cve": "CVE-2023-20593", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-20593" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21912", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21912" }, { "cve": "CVE-2023-21963", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21963" }, { "cve": "CVE-2023-21980", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21980" }, { "cve": "CVE-2023-22025", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22025" }, { "cve": "CVE-2023-22067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22067" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22652", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22652" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25153", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25153" }, { "cve": "CVE-2023-25173", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25173" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-2700", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2700" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-2975", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2975" }, { "cve": "CVE-2023-30079", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30079" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-3090", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3090" }, { "cve": "CVE-2023-32067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32067" }, { "cve": "CVE-2023-32360", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32360" }, { "cve": "CVE-2023-32435", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32435" }, { "cve": "CVE-2023-32439", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32439" }, { "cve": "CVE-2023-32732", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32732" }, { "cve": "CVE-2023-3341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3341" }, { "cve": "CVE-2023-3390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3390" }, { "cve": "CVE-2023-33953", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-33953" }, { "cve": "CVE-2023-34058", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34058" }, { "cve": "CVE-2023-34059", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34059" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-34969", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35788", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35788" }, { "cve": "CVE-2023-3611", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3611" }, { "cve": "CVE-2023-37450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-37450" }, { "cve": "CVE-2023-3776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3776" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4004" }, { "cve": "CVE-2023-4206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4206" }, { "cve": "CVE-2023-4207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4207" }, { "cve": "CVE-2023-4208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4208" }, { "cve": "CVE-2023-42753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-42753" }, { "cve": "CVE-2023-4785", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4785" }, { "cve": "CVE-2023-4807", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4863", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5043", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5043" }, { "cve": "CVE-2023-5129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5129" }, { "cve": "CVE-2023-5363", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5363" }, { "cve": "CVE-2024-20918", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20918" }, { "cve": "CVE-2024-20919", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20919" }, { "cve": "CVE-2024-20921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20921" }, { "cve": "CVE-2024-20926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20926" }, { "cve": "CVE-2024-20932", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20932" }, { "cve": "CVE-2024-20945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20945" }, { "cve": "CVE-2024-20952", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20952" }, { "cve": "CVE-2024-39511", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39511" }, { "cve": "CVE-2024-39512", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39512" }, { "cve": "CVE-2024-39513", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39513" }, { "cve": "CVE-2024-39514", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39514" }, { "cve": "CVE-2024-39517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39517" }, { "cve": "CVE-2024-39518", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39518" }, { "cve": "CVE-2024-39519", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39519" }, { "cve": "CVE-2024-39520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39520" }, { "cve": "CVE-2024-39521", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39521" }, { "cve": "CVE-2024-39522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39522" }, { "cve": "CVE-2024-39523", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39523" }, { "cve": "CVE-2024-39524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39524" }, { "cve": "CVE-2024-39528", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39528" }, { "cve": "CVE-2024-39529", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39529" }, { "cve": "CVE-2024-39530", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39530" }, { "cve": "CVE-2024-39531", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39531" }, { "cve": "CVE-2024-39532", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39532" }, { "cve": "CVE-2024-39533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39533" }, { "cve": "CVE-2024-39535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39535" }, { "cve": "CVE-2024-39536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39536" }, { "cve": "CVE-2024-39537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39537" }, { "cve": "CVE-2024-39538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39538" }, { "cve": "CVE-2024-39539", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39539" }, { "cve": "CVE-2024-39540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39540" }, { "cve": "CVE-2024-39541", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39541" }, { "cve": "CVE-2024-39542", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39542" }, { "cve": "CVE-2024-39543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39543" }, { "cve": "CVE-2024-39545", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39545" }, { "cve": "CVE-2024-39546", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39546" }, { "cve": "CVE-2024-39548", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39548" }, { "cve": "CVE-2024-39549", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39549" }, { "cve": "CVE-2024-39550", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39550" }, { "cve": "CVE-2024-39551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39551" }, { "cve": "CVE-2024-39553", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39553" }, { "cve": "CVE-2024-39554", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39554" }, { "cve": "CVE-2024-39555", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39555" }, { "cve": "CVE-2024-39556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39556" }, { "cve": "CVE-2024-39557", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39557" }, { "cve": "CVE-2024-39558", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39558" }, { "cve": "CVE-2024-39559", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39559" }, { "cve": "CVE-2024-39560", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39560" }, { "cve": "CVE-2024-39561", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39561" }, { "cve": "CVE-2024-39565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39565" } ] }
wid-sec-w-2023-0809
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0809 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0809.json" }, { "category": "self", "summary": "WID-SEC-2023-0809 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0809" }, { "category": "external", "summary": "IBM Security Bulletin: 6967283 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967283" }, { "category": "external", "summary": "IBM Security Bulletin: 6967333 vom 2023-03-30", "url": "https://www.ibm.com/support/pages/node/6967333" }, { "category": "external", "summary": "IBM Security Bulletin 6980799 vom 2023-04-04", "url": "https://www.ibm.com/support/pages/node/6980799" }, { "category": "external", "summary": "IBM Security Bulletin 7108657 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108657" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-5ECC250449 vom 2024-02-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5ecc250449" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-19T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:47:38.606+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0809", "initial_release_date": "2023-03-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-03-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Fedora aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version_range", "name": "\u003c User Behavior Analytics 4.1.11", "product": { "name": "IBM QRadar SIEM \u003c User Behavior Analytics 4.1.11", "product_id": "T027026" } }, { "category": "product_version_range", "name": "\u003c 7.4.3 FP9", "product": { "name": "IBM QRadar SIEM \u003c 7.4.3 FP9", "product_id": "T027027" } }, { "category": "product_version_range", "name": "\u003c 7.5.0 UP5", "product": { "name": "IBM QRadar SIEM \u003c 7.5.0 UP5", "product_id": "T027028" } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2023-22809" }, { "cve": "CVE-2022-4883", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-4883" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-46363", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-46363" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-4254", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-4254" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41946", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-41946" }, { "cve": "CVE-2022-41704", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-41704" }, { "cve": "CVE-2022-40156", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40156" }, { "cve": "CVE-2022-40155", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40155" }, { "cve": "CVE-2022-40154", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40154" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37598", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-37598" }, { "cve": "CVE-2022-3676", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-3676" }, { "cve": "CVE-2022-36364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-36364" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34917", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-34917" }, { "cve": "CVE-2022-31197", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-31197" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-28733", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-28733" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-25927", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-25927" }, { "cve": "CVE-2022-25901", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-25901" }, { "cve": "CVE-2022-25758", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-25758" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-24839" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24785", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-24785" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-21724", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21724" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2022-21619" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-42740", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-42740" }, { "cve": "CVE-2021-42581", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-42581" }, { "cve": "CVE-2021-39227", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-39227" }, { "cve": "CVE-2021-3918", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-3918" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-3765", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-3765" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-26401", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-26401" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-23450", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23450" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-23368", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23368" }, { "cve": "CVE-2021-23364", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23364" }, { "cve": "CVE-2021-23362", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23362" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2021-21290" }, { "cve": "CVE-2020-7764", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-7764" }, { "cve": "CVE-2020-5259", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-5259" }, { "cve": "CVE-2020-24025", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-24025" }, { "cve": "CVE-2020-15366", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-15366" }, { "cve": "CVE-2020-13936", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2020-13936" }, { "cve": "CVE-2019-6286", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2019-6286" }, { "cve": "CVE-2019-6284", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2019-6284" }, { "cve": "CVE-2019-6283", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2019-6283" }, { "cve": "CVE-2019-10785", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2019-10785" }, { "cve": "CVE-2018-8036", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-8036" }, { "cve": "CVE-2018-20821", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-20821" }, { "cve": "CVE-2018-20190", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-20190" }, { "cve": "CVE-2018-19839", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-19839" }, { "cve": "CVE-2018-19838", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-19838" }, { "cve": "CVE-2018-19827", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-19827" }, { "cve": "CVE-2018-19797", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-19797" }, { "cve": "CVE-2018-15494", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-15494" }, { "cve": "CVE-2018-11698", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-11698" }, { "cve": "CVE-2018-11694", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Diese bestehen in verschiedenen Software-Komponenten von QRadar. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Informationen falsch darzustellen, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsvorkehrungen zu umgehen, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren oder unbekannte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T022954", "74185" ] }, "release_date": "2023-03-30T22:00:00.000+00:00", "title": "CVE-2018-11694" } ] }
wid-sec-w-2023-0857
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0857 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0857.json" }, { "category": "self", "summary": "WID-SEC-2023-0857 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0857" }, { "category": "external", "summary": "IBM Security Bulletin 6980799 vom 2023-04-04", "url": "https://www.ibm.com/support/pages/node/6980799" }, { "category": "external", "summary": "IBM Security Bulletin: 6589583 vom 2022-05-24", "url": "https://www.ibm.com/support/pages/node/6589583" }, { "category": "external", "summary": "IBM Security Bulletin: 6589583 vom 2022-05-24", "url": "https://www.ibm.com/support/pages/node/6589581" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-04T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:48:07.460+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0857", "initial_release_date": "2022-05-24T22:00:00.000+00:00", "revision_history": [ { "date": "2022-05-24T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15168", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-15168" }, { "cve": "CVE-2020-24025", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-24025" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28498", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-28498" }, { "cve": "CVE-2020-28500", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-28500" }, { "cve": "CVE-2020-7793", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2020-7793" }, { "cve": "CVE-2021-23337", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-23337" }, { "cve": "CVE-2021-27292", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-27292" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33502", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-33502" }, { "cve": "CVE-2021-33623", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-33623" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in den Komponenten \"Node.js\", \"node-sass\" sowie \"UAParser.js\". Ein entfernter, anonymer oder lokaler Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien manipulieren oder Sicherheitsvorkehrungen zu umgehen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T021415" ] }, "release_date": "2022-05-24T22:00:00.000+00:00", "title": "CVE-2021-3807" } ] }
icsa-22-069-09
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability in third-party components could allow an attacker to interfere with the affected product in various ways.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-389290.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-069-09 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-069-09.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-069-09 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-09" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt" } ], "title": "Siemens SINEC INS", "tracking": { "current_release_date": "2022-03-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-069-09", "initial_release_date": "2022-03-10T00:00:00.000000Z", "revision_history": [ { "date": "2022-03-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-069-09 Siemens SINEC INS" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V1.0.1.1", "product": { "name": "SINEC INS", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SINEC INS" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19242", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19242 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19242 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19242.json" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19242" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19244" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19317" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19603" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19645" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19646" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19880" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19924" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8169" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8177" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8231" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8284" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8285" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8286" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8625" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9327" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11655" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11656" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13630" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13631" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13632" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13871" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15358" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22876" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22890" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22897" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22898" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22901" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22921" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22922" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22923" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22924" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22925" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22926" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25214" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25215" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25216" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25219" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37713" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39134" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39135" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19242" }, { "cve": "CVE-2019-19244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19244 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19244 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19244.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19317", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19317 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19317 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19317.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19603 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19603 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19603.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19645", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19645 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19645 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19645.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19646", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19646 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19646 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19646.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19880", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19880 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19880 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19880.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19923 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19923 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19923.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19924", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19924 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19924 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19924.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19925", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19925 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19925 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19925.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19926", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19926 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19926 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19926.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19926" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-1971 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-1971 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-1971.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "notes": [ { "category": "summary", "text": "This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require(\u0027y18n\u0027)(); y18n.setLocale(\u0027PROTO\u0027); y18n.updateLocale({polluted: true}); console.log(polluted); // true", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-7774 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-7774 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-7774.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8169 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8169 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8169.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8177 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8177 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8177.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8231 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8231 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8231.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8265 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8265 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8265.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8265" }, { "cve": "CVE-2020-8284", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8284 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8284 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8284.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8285 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8285 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8285.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8286 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8286 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8286.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8287 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8287 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8287.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8287" }, { "cve": "CVE-2020-8625", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -\u003e 9.11.27, 9.12.0 -\u003e 9.16.11, and versions BIND 9.11.3-S1 -\u003e 9.11.27-S1 and 9.16.8-S1 -\u003e 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8625 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8625 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8625.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8625" }, { "cve": "CVE-2020-9327", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-9327 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-9327 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-9327.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-9327" }, { "cve": "CVE-2020-11655", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-11655 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-11655 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11655.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-11656 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-11656 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11656.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-11656" }, { "cve": "CVE-2020-13630", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13630 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13630 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13630.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13631 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13631 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13631.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13632 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13632 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13632.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13871 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13871 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13871.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13871" }, { "cve": "CVE-2020-15358", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-15358 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-15358 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15358.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-15358" }, { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-27304 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-27304 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-27304" }, { "cve": "CVE-2021-3449", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3449 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3449 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3449.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3450 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3450 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3450.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3672 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3672 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3672.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3672" }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3711 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3711 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3711.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3712 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3712 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3712.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3712" }, { "cve": "CVE-2021-22876", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22876 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22876 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22876.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an \u0027unknownProtocol\u0027 are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22883 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22883 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22883.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22883" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22884 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22884 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22884.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22884" }, { "cve": "CVE-2021-22890", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22890 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22890 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22890.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22897 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22897 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22897.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22898 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22898 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22898.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22901 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22901 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22901.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22918", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22918 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22918 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22918.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22918" }, { "cve": "CVE-2021-22921", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22921 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22921 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22921.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22921" }, { "cve": "CVE-2021-22922", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22922 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22922 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22922.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22923 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22923 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22923.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths _case insensitively_,which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22924 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22924 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22924.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22925 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22925 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22925.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22926 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22926 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22926.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22930 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22930 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22930.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22930" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22931 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22931 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22931.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22931" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "If the Node.js https API was used incorrectly and \"undefined\" was in passed for the \"rejectUnauthorized\" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22939 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22939 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22939.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22939" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22940 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22940 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22940.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22940" }, { "cve": "CVE-2021-22945", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it _again_.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22945 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22945 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22945.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations WITHOUTTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22946 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22946 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22946.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got _before_ the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22947 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22947 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22947.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23362", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-23362 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-23362 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23362.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-23362" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-23840 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-23840 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23840.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-23840" }, { "cve": "CVE-2021-25214", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.8.5 -\u003e 9.8.8, 9.9.3 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25214 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25214 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25214.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25214" }, { "cve": "CVE-2021-25215", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.0.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25215 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25215 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25215.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25215" }, { "cve": "CVE-2021-25216", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.5.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.11.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25216 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25216 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25216.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25216" }, { "cve": "CVE-2021-25219", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In BIND 9.3.0 -\u003e 9.11.35, 9.12.0 -\u003e 9.16.21, and versions 9.9.3-S1 -\u003e 9.11.35-S1 and 9.16.8-S1 -\u003e 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25219 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25219 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25219.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25219" }, { "cve": "CVE-2021-27290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-27290 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-27290 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-27290.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-27290" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-32803 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-32803 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32803.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-32804 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-32804 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32804.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-37701", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both \\ and / characters as path separators, however \\ is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at FOO, followed by a symbolic link named foo, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the FOO directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37701 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37701 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37701.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37712 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37712 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37712.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain .. path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as C:some\\path. If the drive letter does not match the extraction target, for example D:\\extraction\\dir, then the result of path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the C: drive, rather than the extraction target directory. Additionally, a .. portion of the path could occur immediately after the drive letter, such as C:../foo, and was not properly sanitized by the logic that checked for .. within the normalized and split portions of the path. This only affects users of node-tar on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37713 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37713 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37713.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37713" }, { "cve": "CVE-2021-39134", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "summary", "text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in package.json manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist\u0027s internal data structure saw them as separate items that could coexist within the same level in the node_modules hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as file:/some/path, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package pwn-a could define a dependency in their package.json file such as \"foo\": \"file:/some/path\". Another package, pwn-b could define a dependency such as FOO: \"file:foo.tgz\". On case-insensitive file systems, if pwn-a was installed, and then pwn-b was installed afterwards, the contents of foo.tgz would be written to /some/path, and any existing contents of /some/path would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39134 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-39134 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39134.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39134" }, { "cve": "CVE-2021-39135", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "summary", "text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project\u0027s node_modules folder. If the node_modules folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a node_modules symbolic link would have to be employed. 1. A preinstall script could replace node_modules with a symlink. (This is prevented by using --ignore-scripts.) 2. An attacker could supply the target with a git repository, instructing them to run npm install --ignore-scripts in the root. This may be successful, because npm install --ignore-scripts is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39135 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-39135 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39135.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39135" } ] }
ghsa-3jfq-g458-7qm9
Vulnerability from github
Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
node-tar
aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths
flag is not set to true
. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc
would turn into home/user/.bashrc
.
This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc
. node-tar
would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc
) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite.
Patches
3.2.2 || 4.4.14 || 5.0.6 || 6.1.1
NOTE: an adjacent issue CVE-2021-32803 affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your node-tar
use case.
Workarounds
Users may work around this vulnerability without upgrading by creating a custom onentry
method which sanitizes the entry.path
or a filter
method which removes entries with absolute paths.
```js const path = require('path') const tar = require('tar')
tar.x({ file: 'archive.tgz', // either add this function... onentry: (entry) => { if (path.isAbsolute(entry.path)) { entry.path = sanitizeAbsolutePathSomehow(entry.path) entry.absolute = path.resolve(entry.path) } },
// or this one filter: (file, entry) => { if (path.isAbsolute(entry.path)) { return false } else { return true } } }) ```
Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.2.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "4.0.0" }, { "fixed": "4.4.14" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "5.0.0" }, { "fixed": "5.0.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "npm", "name": "tar" }, "ranges": [ { "events": [ { "introduced": "6.0.0" }, { "fixed": "6.1.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-32804" ], "database_specific": { "cwe_ids": [ "CWE-22" ], "github_reviewed": true, "github_reviewed_at": "2021-08-03T19:06:15Z", "nvd_published_at": "2021-08-03T19:15:00Z", "severity": "HIGH" }, "details": "### Impact\n\nArbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution\n\n`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. \n\nThis logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. \n\n### Patches\n\n3.2.2 || 4.4.14 || 5.0.6 || 6.1.1\n\nNOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case.\n\n### Workarounds\n\nUsers may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths.\n\n```js\nconst path = require(\u0027path\u0027)\nconst tar = require(\u0027tar\u0027)\n\ntar.x({\n file: \u0027archive.tgz\u0027,\n // either add this function...\n onentry: (entry) =\u003e {\n if (path.isAbsolute(entry.path)) {\n entry.path = sanitizeAbsolutePathSomehow(entry.path)\n entry.absolute = path.resolve(entry.path)\n }\n },\n\n // or this one\n filter: (file, entry) =\u003e {\n if (path.isAbsolute(entry.path)) {\n return false\n } else {\n return true\n }\n }\n})\n```\n\nUsers are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.", "id": "GHSA-3jfq-g458-7qm9", "modified": "2021-08-30T23:14:50Z", "published": "2021-08-03T19:06:36Z", "references": [ { "type": "WEB", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "type": "WEB", "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "type": "PACKAGE", "url": "https://github.com/npm/node-tar" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/1770" }, { "type": "WEB", "url": "https://www.npmjs.com/package/tar" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization" }
gsd-2021-32804
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-32804", "description": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "id": "GSD-2021-32804", "references": [ "https://www.suse.com/security/cve/CVE-2021-32804.html", "https://access.redhat.com/errata/RHSA-2021:5086", "https://access.redhat.com/errata/RHSA-2021:4618", "https://access.redhat.com/errata/RHSA-2021:3666", "https://access.redhat.com/errata/RHSA-2021:3639", "https://access.redhat.com/errata/RHSA-2021:3638", "https://access.redhat.com/errata/RHSA-2021:3623", "https://access.redhat.com/errata/RHSA-2021:3281", "https://access.redhat.com/errata/RHSA-2021:3280", "https://advisories.mageia.org/CVE-2021-32804.html", "https://linux.oracle.com/cve/CVE-2021-32804.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-32804" ], "details": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "id": "GSD-2021-32804", "modified": "2023-12-13T01:23:09.273641Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32804", "STATE": "PUBLIC", "TITLE": "Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "node-tar", "version": { "version_data": [ { "version_value": "\u003c 3.2.2" }, { "version_value": "\u003e= 4.0.0, \u003c 4.4.14" }, { "version_value": "\u003e= 5.0.0, \u003c 5.0.6" }, { "version_value": "\u003e= 6.0.0, \u003c 6.1.1" } ] } } ] }, "vendor_name": "npm" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.npmjs.com/package/tar", "refsource": "MISC", "url": "https://www.npmjs.com/package/tar" }, { "name": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "refsource": "CONFIRM", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "name": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4", "refsource": "MISC", "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "name": "https://www.npmjs.com/advisories/1770", "refsource": "MISC", "url": "https://www.npmjs.com/advisories/1770" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] }, "source": { "advisory": "GHSA-3jfq-g458-7qm9", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c3.2.2||\u003e=4.0.0 \u003c4.4.14||\u003e=5.0.0 \u003c5.0.6||\u003e=6.0.0 \u003c6.1.1", "affected_versions": "All versions before 3.2.2, all versions starting from 4.0.0 before 4.4.14, all versions starting from 5.0.0 before 5.0.6, all versions starting from 6.0.0 before 6.1.1", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-22", "CWE-78", "CWE-937" ], "date": "2021-10-21", "description": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "fixed_versions": [ "3.2.2", "4.4.14", "5.0.6", "6.1.1" ], "identifier": "CVE-2021-32804", "identifiers": [ "GHSA-3jfq-g458-7qm9", "CVE-2021-32804" ], "not_impacted": "All versions starting from 3.2.2 before 4.0.0, all versions starting from 4.4.14 before 5.0.0, all versions starting from 5.0.6 before 6.0.0, all versions starting from 6.1.1", "package_slug": "npm/tar", "pubdate": "2021-08-03", "solution": "Upgrade to versions 3.2.2, 4.4.14, 5.0.6, 6.1.1 or above.", "title": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "urls": [ "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4", "https://www.npmjs.com/advisories/1770", "https://www.npmjs.com/package/tar", "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "https://www.oracle.com/security-alerts/cpuoct2021.html", "https://github.com/advisories/GHSA-3jfq-g458-7qm9" ], "uuid": "8d63f9f1-0a88-4f8d-b423-48892f01c709" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "3.2.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "4.4.14", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "5.0.6", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tar_project:tar:*:*:*:*:*:node.js:*:*", "cpe_name": [], "versionEndExcluding": "6.1.1", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32804" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.npmjs.com/advisories/1770", "refsource": "MISC", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://www.npmjs.com/advisories/1770" }, { "name": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4" }, { "name": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "refsource": "CONFIRM", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" }, { "name": "https://www.npmjs.com/package/tar", "refsource": "MISC", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/tar" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2 } }, "lastModifiedDate": "2022-04-25T19:12Z", "publishedDate": "2021-08-03T19:15Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.